The web application hacker's handbook : finding and exploiting security flaws /
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been c...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis :
Wiley,
2011.
|
Edición: | 2nd ed. |
Colección: | Online access with subscription: Proquest Ebook Central.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn759159321 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110818s2011 inu of 000 0 eng d | ||
010 | |z 2011936906 | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d YDXCP |d EBLCP |d MERUC |d OCLCO |d DEBSZ |d OLC |d OCLCQ |d OCLCF |d FHM |d OCLCO |d OCLCQ |d STF |d GZM |d N$T |d TEFOD |d UMI |d COO |d CNMTR |d REB |d OCLCO |d TEFOD |d S3O |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d CNNOR |d MOR |d Z5A |d LIP |d PIFAG |d ZCU |d OCLCQ |d U3W |d OCLCA |d KIJ |d UUM |d WRM |d BRL |d CEF |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d AU@ |d OCLCQ |d UHL |d OCLCQ |d K6U |d OCLCQ |d UKAHL |d OCLCO |d LVT |d CZL |d BRF |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB159288 |2 bnb | ||
016 | 7 | |a 015809108 |2 Uk | |
019 | |a 759406030 |a 778836673 |a 786167000 |a 961631467 |a 962609538 |a 1039416063 |a 1055405095 |a 1060197467 |a 1062923337 |a 1081292495 |a 1103250630 |a 1113004886 |a 1122588951 |a 1135830819 |a 1153001497 |a 1166563715 |a 1229229287 |a 1229414910 |a 1295609458 | ||
020 | |a 9781118175224 |q (e-book) | ||
020 | |a 1118175220 |q (e-book) | ||
020 | |a 9781118175248 |q (ebk) | ||
020 | |a 1118175247 |q (ebk) | ||
020 | |a 9781118175231 |q (ebk) | ||
020 | |a 1118175239 |q (ebk) | ||
020 | |a 9781118906736 | ||
020 | |a 111890673X | ||
020 | |a 9781118906774 |q (e-book) | ||
020 | |a 1118906772 |q (e-book) | ||
020 | |z 1118026470 |q (pbk. ; |q alk. paper) | ||
020 | |z 9781118026472 | ||
020 | |a 9781283258210 | ||
020 | |a 1283258218 | ||
020 | |z 9786613258212 | ||
029 | 1 | |a AU@ |b 000050991516 | |
029 | 1 | |a AU@ |b 000053278245 | |
029 | 1 | |a AU@ |b 000058371772 | |
029 | 1 | |a DEBBG |b BV040901115 | |
029 | 1 | |a DEBBG |b BV044159911 | |
029 | 1 | |a DEBSZ |b 372735169 | |
029 | 1 | |a DEBSZ |b 37828309X | |
029 | 1 | |a DEBSZ |b 381371492 | |
029 | 1 | |a DEBSZ |b 397182392 | |
029 | 1 | |a NZ1 |b 14520388 | |
029 | 1 | |a AU@ |b 000073145914 | |
035 | |a (OCoLC)759159321 |z (OCoLC)759406030 |z (OCoLC)778836673 |z (OCoLC)786167000 |z (OCoLC)961631467 |z (OCoLC)962609538 |z (OCoLC)1039416063 |z (OCoLC)1055405095 |z (OCoLC)1060197467 |z (OCoLC)1062923337 |z (OCoLC)1081292495 |z (OCoLC)1103250630 |z (OCoLC)1113004886 |z (OCoLC)1122588951 |z (OCoLC)1135830819 |z (OCoLC)1153001497 |z (OCoLC)1166563715 |z (OCoLC)1229229287 |z (OCoLC)1229414910 |z (OCoLC)1295609458 | ||
037 | |a CL0500000133 |b Safari Books Online | ||
037 | |a 8251E120-9C71-49FF-AD9C-1BA4A0EB210B |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.875.I57 |b S78 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 004 |
049 | |a UAMI | ||
100 | 1 | |a Stuttard, Dafydd, |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjJXXyb3h8BCj6Jg9MwX3P | |
245 | 1 | 4 | |a The web application hacker's handbook : |b finding and exploiting security flaws / |c Dafydd Stuttard, Marcus Pinto. |
250 | |a 2nd ed. | ||
260 | |a Indianapolis : |b Wiley, |c 2011. | ||
300 | |a 1 online resource (912 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
505 | 0 | |a Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : Cross-site scripting -- Attacking users : Other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology. | |
520 | |a The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack technique. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
650 | 7 | |a Internet |x Security measures. |2 sears | |
650 | 7 | |a Computer security. |2 sears | |
700 | 1 | |a Pinto, Marcus, |d 1978- |1 https://id.oclc.org/worldcat/entity/E39PCjxc4HHxcFfWMwGMYR3TQC | |
758 | |i has work: |a The web application hacker's handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFQ6MPhyPr3cp49rVfFWcK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Stuttard, Dafydd. |t Web application hacker's handbook. |b 2nd ed. |d Indianapolis : Wiley, 2011 |w (DLC) 2011936906 |
830 | 0 | |a Online access with subscription: Proquest Ebook Central. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=819008 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118026472/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH21626687 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL819008 | ||
938 | |a ebrary |b EBRY |n ebr10494632 | ||
938 | |a EBSCOhost |b EBSC |n 391534 | ||
938 | |a YBP Library Services |b YANK |n 7188099 | ||
994 | |a 92 |b IZTAP |