Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa

Tutkielmassa kartoitetaan, kuinka SQL-injektioita, Cross-Site Scripting -hyökkäyksiä ja Cross-Site Request Forgery -hyökkäyksiä voidaan ehkäistä PHP-sovelluksissa defensiivisillä ohjelmointimenetelmillä. This thesis explores the defensive programming techniques for preventing SQL injections, Cross-...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Lehtinen, Mika
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2012
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/40698
_version_ 1826225793531904001
author Lehtinen, Mika
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Lehtinen, Mika Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Lehtinen, Mika Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Lehtinen, Mika
datasource_str_mv jyx
description Tutkielmassa kartoitetaan, kuinka SQL-injektioita, Cross-Site Scripting -hyökkäyksiä ja Cross-Site Request Forgery -hyökkäyksiä voidaan ehkäistä PHP-sovelluksissa defensiivisillä ohjelmointimenetelmillä. This thesis explores the defensive programming techniques for preventing SQL injections, Cross-Site Scripting attacks and Cross-Site Request Forgery attacks in PHP applications.
first_indexed 2013-01-15T21:03:43Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.author", "value": "Lehtinen, Mika", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2013-01-15T16:30:33Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2013-01-15T16:30:33Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2012", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/40698", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa kartoitetaan, kuinka SQL-injektioita, Cross-Site Scripting\n-hy\u00f6kk\u00e4yksi\u00e4 ja Cross-Site Request Forgery -hy\u00f6kk\u00e4yksi\u00e4 voidaan ehk\u00e4ist\u00e4 PHP-sovelluksissa defensiivisill\u00e4 ohjelmointimenetelmill\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis explores the defensive programming techniques for preventing\nSQL injections, Cross-Site Scripting attacks and Cross-Site Request Forgery attacks\nin PHP applications.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Mika Lehtinen (mikkalle) on 2013-01-15 16:30:32.747272. Form: Kandin tutkielma -lomake (1 tekij\u00e4) (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake-1-tekijae). JyX data:", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2013-01-15T16:30:33Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201301151053.pdf: 228662 bytes, checksum: 10b0f5e95723bdfa51da85f2ed3a248d (MD5)\nlicense.html: 5017 bytes, checksum: f2defbca21c581c5670926f76d13e2e4 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2013-01-15T16:30:33Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201301151053.pdf: 228662 bytes, checksum: 10b0f5e95723bdfa51da85f2ed3a248d (MD5)\nlicense.html: 5017 bytes, checksum: f2defbca21c581c5670926f76d13e2e4 (MD5)\n Previous issue date: 2012", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "20", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "PHP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SQL-injektio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cross-site scripting", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cross-site request forgery", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Haavoittuvuuksien torjunta defensiivisill\u00e4 ohjelmointikeinoilla PHP-sovelluksissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201301151053", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2013-01-15T16:30:33Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_40698
language fin
last_indexed 2025-02-18T10:56:06Z
main_date 2012-01-01T00:00:00Z
main_date_str 2012
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/31cc1546-0bdd-4c59-87b4-beacd002b48e\/download","text":"URN:NBN:fi:jyu-201301151053.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2012
record_format qdc
source_str_mv jyx
spellingShingle Lehtinen, Mika Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa PHP SQL-injektio cross-site scripting cross-site request forgery Tietotekniikka Mathematical Information Technology
title Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
title_full Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
title_fullStr Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
title_full_unstemmed Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
title_short Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
title_sort haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla php sovelluksissa
title_txtP Haavoittuvuuksien torjunta defensiivisillä ohjelmointikeinoilla PHP-sovelluksissa
topic PHP SQL-injektio cross-site scripting cross-site request forgery Tietotekniikka Mathematical Information Technology
topic_facet Mathematical Information Technology PHP SQL-injektio Tietotekniikka cross-site request forgery cross-site scripting
url https://jyx.jyu.fi/handle/123456789/40698 http://www.urn.fi/URN:NBN:fi:jyu-201301151053
work_keys_str_mv AT lehtinenmika haavoittuvuuksientorjuntadefensiivisilläohjelmointikeinoillaphpsovelluksissa