<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02255nam a2200265 a 4500</leader>
  <controlfield tag="001">1/45419</controlfield>
  <controlfield tag="008">140828s2007    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781597492096</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1597492094</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48379</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Web application vulnerabilities</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">detect, exploit, prevent /</subfield>
   <subfield code="c">Michael Cross ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Burlington, MA :</subfield>
   <subfield code="b">Syngress Pub.,</subfield>
   <subfield code="c">c2007.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xv, 460 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications. Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more. See why Cross Site Scripting attacks can be so devastating. Download working code from the companion Web site.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Chapter 1: Introduction -- Chapter 2: Information Gathering Techniques -- Chapter 3: Common Input Validation Vulnerabilities -- Chapter 4: Application Logic Flaws and Common Coding Issues -- Chapter 5: Common Client Trust Issues -- Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment -- Chapter 7: Session Management Vulnerabilities -- Chapter 8: Phishing -- Chapter 9: Client Side Security -- Chapter 10: Same Issues / New Technologies -- Chapter 11: Other Security Considerations.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Application software</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Cross, Michael,</subfield>
   <subfield code="d">1965-</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140828</subfield>
   <subfield code="p">00b48379</subfield>
   <subfield code="q">00b48379</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781597492096</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48379_9781597492096.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48379_1597492094.jpg</subfield>
  </datafield>
 </record>
</collection>
