Cargando…

The web application hacker's handbook : finding and exploiting security flaws /

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stuttard, Dafydd, 1972-
Otros Autores: Pinto, Marcus, 1978-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis : Wiley, 2011.
Edición:2nd ed.
Colección:Online access with subscription: Proquest Ebook Central.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn759159321
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 110818s2011 inu of 000 0 eng d
010 |z  2011936906 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d YDXCP  |d EBLCP  |d MERUC  |d OCLCO  |d DEBSZ  |d OLC  |d OCLCQ  |d OCLCF  |d FHM  |d OCLCO  |d OCLCQ  |d STF  |d GZM  |d N$T  |d TEFOD  |d UMI  |d COO  |d CNMTR  |d REB  |d OCLCO  |d TEFOD  |d S3O  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d OCLCO  |d CNNOR  |d MOR  |d Z5A  |d LIP  |d PIFAG  |d ZCU  |d OCLCQ  |d U3W  |d OCLCA  |d KIJ  |d UUM  |d WRM  |d BRL  |d CEF  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d AU@  |d OCLCQ  |d UHL  |d OCLCQ  |d K6U  |d OCLCQ  |d UKAHL  |d OCLCO  |d LVT  |d CZL  |d BRF  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB159288  |2 bnb 
016 7 |a 015809108  |2 Uk 
019 |a 759406030  |a 778836673  |a 786167000  |a 961631467  |a 962609538  |a 1039416063  |a 1055405095  |a 1060197467  |a 1062923337  |a 1081292495  |a 1103250630  |a 1113004886  |a 1122588951  |a 1135830819  |a 1153001497  |a 1166563715  |a 1229229287  |a 1229414910  |a 1295609458 
020 |a 9781118175224  |q (e-book) 
020 |a 1118175220  |q (e-book) 
020 |a 9781118175248  |q (ebk) 
020 |a 1118175247  |q (ebk) 
020 |a 9781118175231  |q (ebk) 
020 |a 1118175239  |q (ebk) 
020 |a 9781118906736 
020 |a 111890673X 
020 |a 9781118906774  |q (e-book) 
020 |a 1118906772  |q (e-book) 
020 |z 1118026470  |q (pbk. ;  |q alk. paper) 
020 |z 9781118026472 
020 |a 9781283258210 
020 |a 1283258218 
020 |z 9786613258212 
029 1 |a AU@  |b 000050991516 
029 1 |a AU@  |b 000053278245 
029 1 |a AU@  |b 000058371772 
029 1 |a DEBBG  |b BV040901115 
029 1 |a DEBBG  |b BV044159911 
029 1 |a DEBSZ  |b 372735169 
029 1 |a DEBSZ  |b 37828309X 
029 1 |a DEBSZ  |b 381371492 
029 1 |a DEBSZ  |b 397182392 
029 1 |a NZ1  |b 14520388 
029 1 |a AU@  |b 000073145914 
035 |a (OCoLC)759159321  |z (OCoLC)759406030  |z (OCoLC)778836673  |z (OCoLC)786167000  |z (OCoLC)961631467  |z (OCoLC)962609538  |z (OCoLC)1039416063  |z (OCoLC)1055405095  |z (OCoLC)1060197467  |z (OCoLC)1062923337  |z (OCoLC)1081292495  |z (OCoLC)1103250630  |z (OCoLC)1113004886  |z (OCoLC)1122588951  |z (OCoLC)1135830819  |z (OCoLC)1153001497  |z (OCoLC)1166563715  |z (OCoLC)1229229287  |z (OCoLC)1229414910  |z (OCoLC)1295609458 
037 |a CL0500000133  |b Safari Books Online 
037 |a 8251E120-9C71-49FF-AD9C-1BA4A0EB210B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.875.I57  |b S78 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 004 
049 |a UAMI 
100 1 |a Stuttard, Dafydd,  |d 1972-  |1 https://id.oclc.org/worldcat/entity/E39PCjJXXyb3h8BCj6Jg9MwX3P 
245 1 4 |a The web application hacker's handbook :  |b finding and exploiting security flaws /  |c Dafydd Stuttard, Marcus Pinto. 
250 |a 2nd ed. 
260 |a Indianapolis :  |b Wiley,  |c 2011. 
300 |a 1 online resource (912 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
505 0 |a Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : Cross-site scripting -- Attacking users : Other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology. 
520 |a The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack technique. 
588 0 |a Print version record. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
650 7 |a Internet  |x Security measures.  |2 sears 
650 7 |a Computer security.  |2 sears 
700 1 |a Pinto, Marcus,  |d 1978-  |1 https://id.oclc.org/worldcat/entity/E39PCjxc4HHxcFfWMwGMYR3TQC 
758 |i has work:  |a The web application hacker's handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFQ6MPhyPr3cp49rVfFWcK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Stuttard, Dafydd.  |t Web application hacker's handbook.  |b 2nd ed.  |d Indianapolis : Wiley, 2011  |w (DLC) 2011936906 
830 0 |a Online access with subscription: Proquest Ebook Central. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=819008  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118026472/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21626687 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL819008 
938 |a ebrary  |b EBRY  |n ebr10494632 
938 |a EBSCOhost  |b EBSC  |n 391534 
938 |a YBP Library Services  |b YANK  |n 7188099 
994 |a 92  |b IZTAP