|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocm70720139 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030715s2004 nyua ob 001 0 eng d |
010 |
|
|
|z 2003015774
|
040 |
|
|
|a REDDC
|b eng
|e pn
|c REDDC
|d BAKER
|d OCLCQ
|d TEFOD
|d IDEBK
|d EBLCP
|d OCLCE
|d E7B
|d OCLCQ
|d DKDLA
|d MHW
|d N$T
|d YDXCP
|d FVL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d DEBSZ
|d UKDOC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d TEFOD
|d OCLCQ
|d AZK
|d LOA
|d MOR
|d PIFBR
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCA
|d BUF
|d BRL
|d STF
|d WRM
|d NRAMU
|d ICG
|d OCLCQ
|d VT2
|d OCLCQ
|d A6Q
|d DKC
|d OCLCQ
|d UKCRE
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 56750577
|a 62496646
|a 86174410
|a 475519635
|a 478388639
|a 559958848
|a 607058871
|a 608487229
|a 722438570
|a 728038508
|a 961565137
|a 962599229
|a 966232154
|a 988489956
|a 992116217
|a 1037438655
|a 1038685056
|a 1045558640
|a 1055325792
|a 1076314201
|a 1081195174
|a 1153553705
|
020 |
|
|
|a 0470857447
|q (pbk.)
|
020 |
|
|
|a 9780470857441
|q (pbk.)
|
020 |
|
|
|a 0470857471
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9780470857472
|q (electronic bk. ;
|q Adobe Reader)
|
029 |
1 |
|
|a AU@
|b 000050965292
|
029 |
1 |
|
|a AU@
|b 000053018053
|
029 |
1 |
|
|a DEBBG
|b BV044078910
|
029 |
1 |
|
|a DEBSZ
|b 396055540
|
029 |
1 |
|
|a NZ1
|b 12032855
|
035 |
|
|
|a (OCoLC)70720139
|z (OCoLC)56750577
|z (OCoLC)62496646
|z (OCoLC)86174410
|z (OCoLC)475519635
|z (OCoLC)478388639
|z (OCoLC)559958848
|z (OCoLC)607058871
|z (OCoLC)608487229
|z (OCoLC)722438570
|z (OCoLC)728038508
|z (OCoLC)961565137
|z (OCoLC)962599229
|z (OCoLC)966232154
|z (OCoLC)988489956
|z (OCoLC)992116217
|z (OCoLC)1037438655
|z (OCoLC)1038685056
|z (OCoLC)1045558640
|z (OCoLC)1055325792
|z (OCoLC)1076314201
|z (OCoLC)1081195174
|z (OCoLC)1153553705
|
037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 2CDBE08E-7E95-474E-86F1-F258575745D7
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b H88 2004eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Huseby, Sverre H.
|
245 |
1 |
0 |
|a Innocent code :
|b a security wake-up call for Web programmers /
|c Sverre H. Huseby.
|
260 |
|
|
|a New York :
|b John Wiley & Sons,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xix, 226 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references (pages 209-219) and index.
|
505 |
0 |
|
|a The basics -- Passing data to subsystems -- User input -- Output handling : the cross-site scripting problem -- Web Trojans -- Passwords and other secrets -- Enemies of secure code -- Summary of rules for secure coding.
|
520 |
|
|
|a * This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them* Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions* Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other attacks that work because of missing pieces of code* Shows developers how to change their mindset from Web site construction to Web site destructio.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a World Wide Web
|x Security measures
|2 fast
|
653 |
|
|
|a Andre fag (naturvidenskab og teknik)
|a Andre fag
|
758 |
|
|
|i has work:
|a Innocent code (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH4kp6PfDcRKJrHcRYghH3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Huseby, Sverre H.
|t Innocent code.
|d New York : John Wiley & Sons, ©2004
|w (DLC) 2003015774
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=210558
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n innocentcodesecu0000huse
|
938 |
|
|
|a 123Library
|b 123L
|n 11857
|
938 |
|
|
|a Baker & Taylor
|b BKTY
|c 50.00
|d 37.50
|i 0470857447
|n 0004291545
|s active
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL210558
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10114061
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 119294
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2297231
|
994 |
|
|
|a 92
|b IZTAP
|