Skip to main content

Securing Our Site

Stand on the Backs of Giants—Paranoid, Geeky Giants

  • Chapter
Pro Web 2.0 Application Development with GWT
  • 357 Accesses

Abstract

Security isn’t what you came for. You probably didn’t sit down to build a web site saying to yourself, “My security model is going to blow people away!” Sadly, securing user passwords isn’t a sexy way to build your business—but who said protecting your business from disaster was going to be sexy? The real problem is that getting security right is hard. Just when you think your cute little hash and DIY cookie scheme is working, you realize there’s an attack vector that you’ve forgotten about. A quick browse through the history of cryptographic hash functions illustrates the difficulty of trying to get these things right. It doesn’t take too many smart, focused attackers to find a way for Eve, Mallory, and company to sneak into your site.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Jeff Dwyer

About this chapter

Cite this chapter

(2008). Securing Our Site. In: Pro Web 2.0 Application Development with GWT. Apress. https://doi.org/10.1007/978-1-4302-0637-8_5

Download citation

Publish with us

Policies and ethics