Web application vulnerabilities detect, exploit, prevent /

In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix the...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Cross, Michael, 1965-
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Burlington, MA : Syngress Pub., c2007.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597492096
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
Πίνακας περιεχομένων:
  • Chapter 1: Introduction
  • Chapter 2: Information Gathering Techniques
  • Chapter 3: Common Input Validation Vulnerabilities
  • Chapter 4: Application Logic Flaws and Common Coding Issues
  • Chapter 5: Common Client Trust Issues
  • Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment
  • Chapter 7: Session Management Vulnerabilities
  • Chapter 8: Phishing
  • Chapter 9: Client Side Security
  • Chapter 10: Same Issues / New Technologies
  • Chapter 11: Other Security Considerations.