Table of Contents for
Security and Frontend Performance

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Security and Frontend Performance by Sabrina Burney Published by O'Reilly Media, Inc., 2017
  1. nav
  2. Cover
  3. Free ebooks and reports
  4. Security and Frontend Performance
  5. Security and Frontend Performance
  6. 1. Understanding the Problem
  7. 2. HTTP Strict-Transport-Security
  8. 3. iFrame and Content‑Security‑Policy
  9. 4. Web Linking
  10. 5. Obfuscation
  11. 6. Service Workers: An Introduction
  12. 7. Service Workers: Analytics Monitoring
  13. 8. Service Workers: Control Third Party Content
  14. 9. Service Workers: Other Applications
  15. 10. Summary
  16. About the Authors
  1. 1. Understanding the Problem
    1. Challenges of Today: Rise of Third Parties
      1. Web Traffic
      2. Attacks on the Rise
    2. Technology Trends
    3. Start at the Browser
  2. 2. HTTP Strict-Transport-Security
    1. What Is HSTS?
      1. The Parameters
    2. Last Thoughts
  3. 3. iFrame and Content‑Security‑Policy
    1. Third Party Risks
    2. The Basics: <script>
    3. Improving Frontend Performance
      1. <script> Versus <iframe>
      2. <script> and Content-Security-Policy
      3. <script> Versus <iframe> Versus CSP
    4. Reenforcing Security at the Browser
      1. Sandboxing
      2. Inline Code
      3. Referrer Policies
    5. Last Thoughts
  4. 4. Web Linking
    1. Prefetch and Preload
    2. Where Does Security Fit In?
    3. Last Thoughts
  5. 5. Obfuscation
    1. Learn from Our Attackers
    2. Alternative Application: URL Obfuscation
      1. Concept
    3. URL Obfuscation Benefits
      1. Privacy
      2. Single Point of Failure
      3. Improved Delivery Time
      4. Content-Security-Policy
    4. Last Thoughts
  6. 6. Service Workers: An Introduction
    1. What Are Service Workers?
    2. Gotchas!
  7. 7. Service Workers: Analytics Monitoring
    1. Performance Monitoring Today
    2. Track Metrics with Service Workers
      1. Where Do Performance and Security Fit In?
    3. Last Thoughts: Now Versus the Future
  8. 8. Service Workers: Control Third Party Content
    1. Client Reputation Strategies
    2. Move to Service Worker Reputation Strategies
      1. A Closer Look
    3. Last Thoughts
  9. 9. Service Workers: Other Applications
    1. Input Validation
    2. Geo Content Control
      1. A Closer Look
    3. Last Thoughts
  10. 10. Summary
    1. What Did We Learn?
    2. Last Thoughts
Back to top