|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn162598289 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070806s2001 maua o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OCLCQ
|d OCLCF
|d ZCU
|d YDXCP
|d IDEBK
|d B24X7
|d MERUC
|d EBLCP
|d UKDOC
|d OCLCO
|d OCLCQ
|d LIV
|d OCLCA
|d D6H
|d ICG
|d OCLCQ
|d COO
|d LEAUB
|d DKC
|d OCLCQ
|d OL$
|d OCLCQ
|d HS0
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 50688999
|a 191034961
|
020 |
|
|
|a 9781928994312
|
020 |
|
|
|a 1928994318
|
020 |
|
|
|a 0080478131
|
020 |
|
|
|a 9780080478135
|
029 |
1 |
|
|a AU@
|b 000053221805
|
029 |
1 |
|
|a AU@
|b 000060049094
|
029 |
1 |
|
|a CHBIS
|b 005829690
|
029 |
1 |
|
|a CHNEW
|b 001007008
|
029 |
1 |
|
|a CHVBK
|b 168395258
|
029 |
1 |
|
|a DEBBG
|b BV042307684
|
029 |
1 |
|
|a DEBBG
|b BV044124174
|
029 |
1 |
|
|a DEBSZ
|b 405313721
|
029 |
1 |
|
|a GBVCP
|b 825870313
|
029 |
1 |
|
|a NZ1
|b 12435662
|
035 |
|
|
|a (OCoLC)162598289
|z (OCoLC)50688999
|z (OCoLC)191034961
|
037 |
|
|
|a 100771:100779
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a TK5105.59
|b .H33 2001beb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Hack proofing your Web applications /
|c technical edit by Julie Traxler.
|
246 |
3 |
|
|a Hackproofing your Web applications
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress Pub.,
|c ©2001.
|
300 |
|
|
|a 1 online resource (xxvii, 595 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs.
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a "The only way to stop a hacker is to think like one."
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1928994318.pdf; 1928994318.pdf; Cover; Table of Contents; Foreword; Chapter 1 Hacking Methodology; Chapter 2 How to Avoid Becoming a "Code Grinder"; Chapter 3 Understanding the Risks Associated with Mobile Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing and Reverse Engineering; Chapter 7 Securing Your Java Code; Chapter 8 Securing XML; Chapter 9 Building Safe ActiveX Internet Controls; Chapter 10 Securing ColdFusion; Chapter 11 Developing Security-Enabled Applications; Chapter 12 Cradle to Grave: Working with a Security Plan
|
505 |
8 |
|
|a Appendix Hack Proofing Your Web Applications Fast TrackIndex; Related Titles
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web sites
|x Design.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Conception.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
650 |
|
7 |
|a Web sites
|x Design
|2 fast
|
700 |
1 |
|
|a Traxler, Julie.
|
758 |
|
|
|i has work:
|a Hack proofing your Web applications (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFVTRwTcyJ6QwmPpVQCwyd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Hack proofing your Web applications.
|d Rockland, Mass. : Syngress Pub., ©2001
|z 1928994318
|z 9781928994312
|w (OCoLC)63066049
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294159
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 34037
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00001443
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL294159
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2613262
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2361829
|
994 |
|
|
|a 92
|b IZTAP
|