Web application vulnerabilities detect, exploit, prevent /

In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix the...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Cross, Michael, 1965-
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Burlington, MA : Syngress Pub., c2007.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597492096
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02255nam a2200265 a 4500
001 1/45419
008 140828s2007 us 001 0 eng
020 |a 9781597492096 
020 |a 1597492094 
035 |l 48379 
040 |a OPELS  |b eng  |c OPELS  |d OCLCQ  |d GR-PeUP 
245 0 0 |a Web application vulnerabilities  |h [electronic resource] :  |b detect, exploit, prevent /  |c Michael Cross ... [et al.]. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c c2007. 
300 |a 1 online resource (xv, 460 p.) :  |b ill. 
520 |a In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications. Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more. See why Cross Site Scripting attacks can be so devastating. Download working code from the companion Web site. 
505 0 |a Chapter 1: Introduction -- Chapter 2: Information Gathering Techniques -- Chapter 3: Common Input Validation Vulnerabilities -- Chapter 4: Application Logic Flaws and Common Coding Issues -- Chapter 5: Common Client Trust Issues -- Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment -- Chapter 7: Session Management Vulnerabilities -- Chapter 8: Phishing -- Chapter 9: Client Side Security -- Chapter 10: Same Issues / New Technologies -- Chapter 11: Other Security Considerations. 
500 |a Includes index. 
650 4 |a Application software  |x Security measures. 
650 4 |a Computer security. 
655 4 |a Electronic books. 
700 1 |a Cross, Michael,  |d 1965- 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140828  |p 00b48379  |q 00b48379  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781597492096 
856 4 |d /webopac/covers/03/48379_9781597492096.jpg 
856 4 |d /webopac/covers/03/48379_1597492094.jpg