Start reading Pro PHP Security on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for

Pro PHP Security [Kindle Edition]

Chris Snyder , Michael Southwell

Digital List Price: CDN$ 46.96 What's this?
Print List Price: CDN$ 31.53
Kindle Price: CDN$ 13.06 includes free international wireless delivery via Amazon Whispernet
You Save: CDN$ 18.47 (59%)

Free Kindle Reading App Anybody can read Kindle books even without a Kindle device with the FREE Kindle app for smartphones, tablets, and computers.

To get the free app, enter your e-mail address or mobile phone number.


Amazon Price New from Used from
Kindle Edition CDN $13.06  
Paperback CDN $13.75  

Product Description

Product Description

* One of the first books devoted solely to PHP security

* Covers a wide swath of both defensive and proactive security measures, showing readers how to create captchas, validate email, fend off SQL injection attacks, and more

* Methods discussed are compatible with PHP 3, 4, and 5

About the Author

Chris Snyder is a software engineer at the Fund for the City of New York, where he helps develop next-generation websites and services for nonprofit organizations. He is a member of the executive board of New York PHP, and has been looking for new ways to build scriptable, linked, multimedia content since he saw his first Hypercard stack in 1988.

Product Details

  • Format: Kindle Edition
  • File Size: 4746 KB
  • Print Length: 528 pages
  • Publisher: Apress; 1st Corrected ed. 2005. Corr. 2nd printing 2005 edition (Aug. 23 2006)
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Amazon Bestsellers Rank: #257,878 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 3.9 out of 5 stars  8 reviews
23 of 24 people found the following review helpful
5.0 out of 5 stars Good information with lots of links to addtional resources Nov. 5 2005
By David L. Hickman - Published on
This book is great because it's thorough and on each topic it gives lots of links to additional resources. It's easy to read and it's organized well so you can find what you're looking for.

One of the main things I appreciate about this book is that it gives just the right amount of information. It focuses on practical usage of security techniques but I also like to know the high-level picture of how and why things got to be the way they are. This book tells me exactly what I want to know. A good example is the the section on hashing and encryption. It gives some simplified examples of how the algorithms work and talks about where they came from, which ones are better and why, and how to use them. But it doesn't dive too deeply into encryption theory which would only be interesting to someone wanting to code an encryption routine.

Some of the interesting things I learned from this book are:

1) I learned about the various hashing and encryption algorithms. Which ones are good and just how good are they. Before reading this book I couldn't have told you which is better between md5 and sha1.

2) I learned all about protecting against cross-site scripting and sql injection. I thought I had already taken enough precautions on my latest website,, but this section pointed out some attacks I wasn't aware of. It also had links to sites with sample hack attacks you can run against your own website to see if it's vulnerable.

3) I learned how to do captcha screening to make sure people registering for my site are real humans and not robots (I haven't actually implemented this yet but I will soon). The book also pointed out something I never thought of - a hacker with a popular site can proxy registrations from your site to real people trying to register on his site and defeat your captcha by tricking people who think they are answering a captcha for his site. As usual, the author provides lots of links to other sites for more resources on captcha.

I've never before focused on security as much as I should have. Probably because all the information was not readily available in a single easy-to-digest book until this one. I'm really glad I found this book.
14 of 15 people found the following review helpful
4.0 out of 5 stars Unless you're already well-versed in the topic ... March 8 2006
By John R. Mcwade - Published on
Unless you're already very well-versed in the subject matter, ( sql injection, cross-site scripting, session hijacking, remote execution, sanitizing user data/input, ssh, encryption, ssl, dangers of shared-host scenarios, bulletproofing db installations, user verification, captchas, remote procedure calls ) this material is relatively comprehensive and valuable. Well-organized, well thought out, I won't hesitate to recommend this one.
16 of 18 people found the following review helpful
5.0 out of 5 stars Serious, well-written, should be on your reading list Oct. 24 2005
By David Powers - Published on
One of the great attractions of PHP is that it's easy to learn, and you can use it to build interactive websites in next to no time. Just like learning to drive a car, though, early success can lead to over-confidence. This book is a timely reminder of the pitfalls that lie in wait not only for the unwary, but also for the more experienced PHP programmer.

In keeping with the title, "Pro PHP Security", the authors address many issues that beginners may not regard as being on their immediate horizon. While some issues are advanced, it's a book that should be on the reading list of every PHP user. In addition to practical examples that deal with specific vulnerabilities, there's a clear exposition of the need to understand good application design. Chapter 19 ("Using Roles to Authorize Actions") is an object lesson in how a seemingly straightforward project can rapidly overwhelm you with complexity, and provides good advice on how to avoid this sort of problem.

I suspect that most readers will gravitate towards Part 3, which concentrates on practical solutions for specific security loopholes, such as validating user input, SQL injection, cross-site scripting, and preventing remote execution. Invaluable though these chapters are, the real value lies in making the reader aware of all aspects of security. Preventing accidental deletion of data, even by trusted members of a team, is just as much a security risk as the script kiddie trying to corrupt your data. This book takes a welcome, rounded viewpoint of security issues from a variety of angles. While not scare-mongering, it's a salutary wake-up call.
7 of 7 people found the following review helpful
3.0 out of 5 stars Good info, not many solutions Nov. 5 2007
By Jonny - Published on
Like the title states this book tells you about a lot of security issues you should be aware of, but doesn't go in depth for many solutions. Especially xss which is the only reason i bought the book. For how much the book costs i figured it would include some really good php solutions. I mean the thing is in black and white, what's with the price tag that doesn't tell me anything that i can't find on the web.
26 of 33 people found the following review helpful
1.0 out of 5 stars Very little about PHP security at all Jan. 31 2007
By Bill Stones - Published on
The book is entitled PHP security. But the actual content covers very little PHP at

all: less than 20 percent. It tries to cover everything from UNIX permission,SSH

and all other security issues, but really doesn't have much to do with PHP. So I

think the title is highly misleading. For someone interested in the general

security issues, it might be a fine book. But not for programmers want to know

the security about PHP.

Look for similar items by category