Cantitate/Preț
Produs

Web Application Vulnerabilities: Detect, Exploit, Prevent

Autor Steven Palmer
en Limba Engleză Paperback – 17 dec 2007
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.

  • Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
  • See why Cross Site Scripting attacks can be so devastating.
Citește tot Restrânge

Preț: 44468 lei

Preț vechi: 55585 lei
-20% Nou

Puncte Express: 667

Preț estimativ în valută:
8511 8978$ 7092£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781597492096
ISBN-10: 1597492094
Pagini: 480
Dimensiuni: 191 x 235 x 32 mm
Greutate: 0.95 kg
Editura: ELSEVIER SCIENCE

Public țintă

This book is written for designers, developers, and testers of Web-based applications. These readers are intermediate to advanced and have working knowledge of all common programming languages used for developing Web-based applications including Java, JavaScript, AJAX, ColdFusion, Perl, ActiveX, and the various .net languages.

Cuprins

Chapter 1: Introduction
Chapter 2: Information Gathering Techniques
Chapter 3: Common Input Validation Vulnerabilities
Chapter 4: Application Logic Flaws and Common Coding Issues
Chapter 5: Common Client Trust Issues
Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment
Chapter 7: Session Management Vulnerabilities
Chapter 8: Phishing
Chapter 9: Client Side Security
Chapter 10: Same Issues / New Technologies
Chapter 11: Other Security Considerations