By Π₯ΠΎΡΡΠΌΠ°Π½ ΠΠ»ΠΈΡ
Π₯ΠΎΡΡΠΌΠ°Π½ ΠΠ»ΠΈΡ, 2025, ΠΠ΅ΡΡΡΠ΅Π»Π»Π΅ΡΡ O'Reilly
ΠΠ½ΠΈΠ³Π° ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°Π΅Ρ ΡΡΠΈ ΠΊΠ»ΡΡΠ΅Π²ΡΡ Π°ΡΠΏΠ΅ΠΊΡΠ° Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π²Π΅Π±-ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ: ΡΠ°Π·Π²Π΅Π΄ΠΊΡ, Π½Π°ΠΏΠ°Π΄Π΅Π½ΠΈΠ΅ ΠΈ Π·Π°ΡΠΈΡΡ. ΠΠΎ Π²ΡΠΎΡΠΎΠΌ ΠΈΠ·Π΄Π°Π½ΠΈΠΈ Π°Π²ΡΠΎΡ ΡΠ³Π»ΡΠ±Π»ΡΠ΅ΡΡΡ Π² ΡΠ΅ΠΌΡ, ΡΠ°ΠΊΠΈΠ΅ ΠΊΠ°ΠΊ Π½ΠΎΠ²Π΅ΠΉΡΠΈΠ΅ ΡΠΈΠΏΡ Π°ΡΠ°ΠΊ ΠΈ ΠΌΠ΅ΡΠΎΠ΄Ρ Π·Π°ΡΠΈΡΡ, ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ³ΡΠΎΠ·, ΠΆΠΈΠ·Π½Π΅Π½Π½ΡΠΉ ΡΠΈΠΊΠ» Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΠΉ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΠ ΠΈ Π°ΡΡ ΠΈΡΠ΅ΠΊΡΡΡΠ° Π½ΡΠ»Π΅Π²ΠΎΠ³ΠΎ Π΄ΠΎΠ²Π΅ΡΠΈΡ. Π§ΠΈΡΠ°ΡΠ΅Π»ΠΈ ΠΏΠΎΠ»ΡΡΠ°Ρ ΠΏΠΎΠ΄ΡΠΎΠ±Π½ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡ ΠΎΠ± ΡΠΊΡΠΏΠ»ΠΎΠΉΡΠ°Ρ ΠΈ ΠΌΠ΅ΡΠ°Ρ Π·Π°ΡΠΈΡΡ Π΄Π»Ρ GraphQL, ΠΎΠ±Π»Π°ΡΠ½ΡΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ ΠΈ CDN. ΠΠ»Π°Π²Ρ, ΠΏΠΎΡΠ²ΡΡΠ΅Π½Π½ΡΠ΅ Π°ΡΠ°ΠΊΠ°ΠΌ ΠΈ ΠΈΡ ΠΏΡΠ΅Π΄ΠΎΡΠ²ΡΠ°ΡΠ΅Π½ΠΈΡ, Π΄ΠΎΠΏΠΎΠ»Π½Π΅Π½Ρ ΠΌΠ°ΡΠ΅ΡΠΈΠ°Π»Π°ΠΌΠΈ Π΄Π»Ρ Π±ΠΎΠ»Π΅Π΅ ΠΏΡΠΎΠ΄Π²ΠΈΠ½ΡΡΡΡ ΡΠΏΠ΅ΡΠΈΠ°Π»ΠΈΡΡΠΎΠ².
Alice Hoffman, 2025, O'Reilly Best Sellers
This book explores the three pillars of web application security: reconnaissance, attack, and defense. The second edition delves into topics such as the latest attack types and defense mechanisms, threat modeling, secure software development lifecycle (SSDL/SDLC), and zero-trust architecture. Readers will gain detailed insights into exploits and defenses for GraphQL, cloud technologies, and content delivery networks (CDN). Chapters on attacks and prevention have been enhanced with content for more advanced readers.