Cargando…

Developer's guide to web application security /

Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web applic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cross, Michael, 1965-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub., ©2007.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm85861133
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 070315s2007 maua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d OPELS  |d BDX  |d CCO  |d E7B  |d IDEBK  |d UAB  |d UV0  |d DKDLA  |d ZCU  |d MERUC  |d EBLCP  |d OCLCO  |d NTE  |d FVL  |d B24X7  |d OCLCO  |d OCLCF  |d UMI  |d OCLCQ  |d OCLCO  |d DEBBG  |d NLGGC  |d DEBSZ  |d OCLCQ  |d OCLCO  |d AU@  |d OCLCQ  |d COO  |d AZK  |d JBG  |d AGLDB  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d ROC  |d BRL  |d STF  |d WRM  |d D6H  |d OCLCQ  |d VTS  |d CEF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d A6Q  |d OCLCQ  |d LEAUB  |d DKC  |d OCLCQ  |d M8D  |d VLY  |d UKCRE  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ  |d OCLCL 
019 |a 162131451  |a 182738752  |a 191035125  |a 228146840  |a 228146841  |a 474189573  |a 474270033  |a 507020880  |a 567955626  |a 647645246  |a 722531477  |a 728029629  |a 765142695  |a 780855212  |a 856961264  |a 873843500  |a 888763860  |a 961520361  |a 962663866  |a 962790746  |a 988532523  |a 991986946  |a 1020514096  |a 1037506792  |a 1038678879  |a 1045518088  |a 1055374628  |a 1076300945  |a 1081212179  |a 1153032991  |a 1162551258  |a 1228599855  |a 1235829557  |a 1240509398 
020 |a 9781429456470  |q (electronic bk.) 
020 |a 1429456477  |q (electronic bk.) 
020 |a 9781597490610 
020 |a 159749061X 
020 |a 0080504094 
020 |a 9780080504094 
020 |a 1281060216 
020 |a 9781281060211 
020 |a 9786611060213 
020 |a 6611060219 
024 1 |a 792502090619 
029 1 |a AU@  |b 000048752500 
029 1 |a AU@  |b 000051860804 
029 1 |a AU@  |b 000053246597 
029 1 |a AU@  |b 000053250696 
029 1 |a CHNEW  |b 001004980 
029 1 |a DEBBG  |b BV042031491 
029 1 |a DEBBG  |b BV042314146 
029 1 |a DEBBG  |b BV043142148 
029 1 |a DEBBG  |b BV044123238 
029 1 |a DEBSZ  |b 275161625 
029 1 |a DEBSZ  |b 414169441 
029 1 |a DEBSZ  |b 422226041 
029 1 |a DEBSZ  |b 430383738 
029 1 |a GBVCP  |b 560399375 
029 1 |a NZ1  |b 11777839 
029 1 |a NZ1  |b 12048942 
029 1 |a NZ1  |b 15177152 
029 1 |a DKDLA  |b 820120-katalog:999914705505765 
035 |a (OCoLC)85861133  |z (OCoLC)162131451  |z (OCoLC)182738752  |z (OCoLC)191035125  |z (OCoLC)228146840  |z (OCoLC)228146841  |z (OCoLC)474189573  |z (OCoLC)474270033  |z (OCoLC)507020880  |z (OCoLC)567955626  |z (OCoLC)647645246  |z (OCoLC)722531477  |z (OCoLC)728029629  |z (OCoLC)765142695  |z (OCoLC)780855212  |z (OCoLC)856961264  |z (OCoLC)873843500  |z (OCoLC)888763860  |z (OCoLC)961520361  |z (OCoLC)962663866  |z (OCoLC)962790746  |z (OCoLC)988532523  |z (OCoLC)991986946  |z (OCoLC)1020514096  |z (OCoLC)1037506792  |z (OCoLC)1038678879  |z (OCoLC)1045518088  |z (OCoLC)1055374628  |z (OCoLC)1076300945  |z (OCoLC)1081212179  |z (OCoLC)1153032991  |z (OCoLC)1162551258  |z (OCoLC)1228599855  |z (OCoLC)1235829557  |z (OCoLC)1240509398 
037 |a 133658:133783  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .C767 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Cross, Michael,  |d 1965-  |1 https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK 
245 1 0 |a Developer's guide to web application security /  |c Michael Cross. 
260 |a Rockland, MA :  |b Syngress Pub.,  |c ©2007. 
300 |a 1 online resource (xxii, 489 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. 
520 |a Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web sites  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Web sites  |x Security measures  |2 fast 
758 |i has work:  |a Developer's guide to web application security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGGtGjh4w4d8yDPPxXth73  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Cross, Michael, 1965-  |t Developer's guide to web application security.  |d Rockland, MA : Syngress Pub., ©2007  |z 159749061X  |z 9781597490610  |w (OCoLC)82366027 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597490610/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=289735  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00014077 
938 |a Brodart  |b BROD  |n 05489148  |c $49.95 
938 |a EBL - Ebook Library  |b EBLB  |n EBL289735 
938 |a ebrary  |b EBRY  |n ebr10156086 
938 |a EBSCOhost  |b EBSC  |n 184404 
938 |a Internet Archive  |b INAR  |n developersguidet0000cros 
938 |a YBP Library Services  |b YANK  |n 2535076 
938 |a YBP Library Services  |b YANK  |n 2613884 
994 |a 92  |b IZTAP