Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book:...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley Pub., Inc.,
2013.
|
Edición: | 1. ed. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn841481395 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130502s2013 inua ob 001 0 eng d | ||
040 | |a DKDLA |b eng |e pn |c DKDLA |d OCLCO |d LLB |d E7B |d IDEBK |d OCLCF |d N$T |d TEFOD |d YDXCP |d UKMGB |d UMI |d OCLCA |d OCLCO |d EBLCP |d STF |d B24X7 |d COO |d DEBSZ |d RECBK |d OCLCO |d TEFOD |d OCLCO |d OCLCQ |d OCLCO |d OCL |d OCLCO |d NKT |d OCLCQ |d OCLCO |d AZK |d CNNLC |d OCLCO |d MOR |d CCO |d PIFAG |d LIV |d MERUC |d OCLCQ |d SAV |d OCLCQ |d ZCU |d OCLCA |d U3W |d OCLCA |d COCUF |d REB |d CEF |d WRM |d OCLCQ |d KSU |d NRAMU |d ICG |d INT |d DEBBG |d VT2 |d OCLCQ |d WYU |d S9I |d OCLCQ |d UAB |d A6Q |d DKC |d AU@ |d OCLCQ |d UKAHL |d U@J |d OCLCQ |d BOL |d UKCRE |d OCLCO |d OCLCQ |d TOH |d OCLCQ |d OCLCO |d OCLCL | ||
016 | 7 | |a 016162686 |2 Uk | |
019 | |a 823719322 |a 828678288 |a 844973133 |a 865012359 |a 879653122 |a 883144846 |a 961567586 |a 962678167 |a 988438818 |a 992016703 |a 1026439361 |a 1037793837 |a 1038588489 |a 1045505368 |a 1055407574 |a 1065982782 |a 1081209616 |a 1083554106 |a 1103268537 |a 1105724949 |a 1114380747 |a 1129373491 |a 1132915980 |a 1142772821 |a 1153045255 |a 1192348905 |a 1228590167 |a 1240508715 | ||
020 | |a 9781118362181 |q (pbk. ; |q alk. paper) | ||
020 | |a 1118362187 |q (pbk. ; |q alk. paper) | ||
020 | |a 9781118568712 |q (e-book) | ||
020 | |a 1118568710 |q (e-book) | ||
020 | |a 9781118417058 |q (electronic bk.) | ||
020 | |a 1118417054 |q (electronic bk.) | ||
020 | |a 9781118568651 |q (ebk) | ||
020 | |a 1118568656 |q (ebk) | ||
028 | 0 | 1 | |a EB00066819 |b Recorded Books |
029 | 1 | |a AU@ |b 000052281586 | |
029 | 1 | |a AU@ |b 000053029717 | |
029 | 1 | |a CHNEW |b 000600015 | |
029 | 1 | |a DEBBG |b BV041430551 | |
029 | 1 | |a DEBBG |b BV041913049 | |
029 | 1 | |a DEBBG |b BV044049896 | |
029 | 1 | |a DEBSZ |b 397460872 | |
029 | 1 | |a DEBSZ |b 398263418 | |
029 | 1 | |a GBVCP |b 1014934486 | |
029 | 1 | |a GBVCP |b 785368531 | |
029 | 1 | |a NZ1 |b 14977012 | |
029 | 1 | |a AU@ |b 000055885477 | |
035 | |a (OCoLC)841481395 |z (OCoLC)823719322 |z (OCoLC)828678288 |z (OCoLC)844973133 |z (OCoLC)865012359 |z (OCoLC)879653122 |z (OCoLC)883144846 |z (OCoLC)961567586 |z (OCoLC)962678167 |z (OCoLC)988438818 |z (OCoLC)992016703 |z (OCoLC)1026439361 |z (OCoLC)1037793837 |z (OCoLC)1038588489 |z (OCoLC)1045505368 |z (OCoLC)1055407574 |z (OCoLC)1065982782 |z (OCoLC)1081209616 |z (OCoLC)1083554106 |z (OCoLC)1103268537 |z (OCoLC)1105724949 |z (OCoLC)1114380747 |z (OCoLC)1129373491 |z (OCoLC)1132915980 |z (OCoLC)1142772821 |z (OCoLC)1153045255 |z (OCoLC)1192348905 |z (OCoLC)1228590167 |z (OCoLC)1240508715 | ||
037 | |a CL0500000428 |b Safari Books Online | ||
037 | |a 9599D8D7-C007-49BD-B64E-14CCD7232DB3 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b B37 2013eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Barnett, Ryan C. | |
245 | 1 | 0 | |a Web Application Defender's Cookbook : |b Battling Hackers and Protecting Users. |
250 | |a 1. ed. | ||
260 | |a Indianapolis, Ind. : |b Wiley Pub., Inc., |c 2013. | ||
300 | |a 1 online resource (xxix, 522 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Part I: Preparing the Battle Space; Chapter 1: Application Fortification; Recipe 1-1: Real-time Application Profiling; Recipe 1-2: Preventing Data Manipulation with Cryptographic Hash Tokens; Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS); Recipe 1-4: Integrating Intrusion Detection System Signatures; Recipe 1-5: Using Bayesian Attack Payload Detection; HTTP Audit Logging; Recipe 1-6: Enable Full HTTP Audit Logging; Recipe 1-7: Logging Only Relevant Transactions; Recipe 1-9: Obscuring Sensitive Data in Logs. | |
505 | 8 | |a Recipe 1-10: Sending Alerts to a Central Log Host Using SyslogRecipe 1-11: Using the ModSecurity AuditConsole; Recipe 1-8: Ignoring Requests for Static Content; Chapter 2: Vulnerability Identification and Remediation; Internally Developed Applications; Externally Developed Applications; Virtual Patching; Recipe 2-1: Passive Vulnerability Identification; Active Vulnerability Identification; Recipe 2-2: Active Vulnerability Identification; Manual Vulnerability Remediation; Recipe 2-3: Manual Scan Result Conversion; Recipe 2-4: Automated Scan Result Conversion. | |
505 | 8 | |a Recipe 2-5: Real-time Resource Assessments and Virtual PatchingChapter 3: Poisoned Pawns (Hacker Traps); Honeytrap Concepts; Recipe 3-1: Adding Honeypot Ports; Recipe 3-2: Adding Fake robots.txt Disallow Entries; Recipe 3-3: Adding Fake HTML Comments; Recipe 3-4: Adding Fake Hidden Form Fields; Recipe 3-5: Adding Fake Cookies; Part II: Asymmetric Warfare; Chapter 4: Reputation and Third-Party Correlation; Suspicious Source Identification; Recipe 4-1: Analyzing the Client's Geographic Location Data; Recipe 4-2: Identifying Suspicious Open Proxy Usage. | |
505 | 8 | |a Recipe 4-3: Utilizing Real-time Blacklist Lookups (RBL)Recipe 4-4: Running Your Own RBL; Recipe 4-5: Detecting Malicious Links; Chapter 5: Request Data Analysis; Request Data Acquisition; Recipe 5-1: Request Body Access; Recipe 5-2: Identifying Malformed Request Bodies; Recipe 5-3: Normalizing Unicode; Recipe 5-4: Identifying Use of Multiple Encodings; Recipe 5-5: Identifying Encoding Anomalies; Input Validation Anomalies; Recipe 5-6: Detecting Request Method Anomalies; Recipe 5-7: Detecting Invalid URI Data; Recipe 5-8: Detecting Request Header Anomalies. | |
505 | 8 | |a Recipe 5-9: Detecting Additional ParametersRecipe 5-10: Detecting Missing Parameters; Recipe 5-11: Detecting Duplicate Parameter Names; Recipe 5-12: Detecting Parameter Payload Size Anomalies; Recipe 5-13: Detecting Parameter Character Class Anomalies; Chapter 6: Response Data Analysis; Recipe 6-1: Detecting Response Header Anomalies; Recipe 6-2: Detecting Response Header Information Leakages; Recipe 6-3: Response Body Access; Recipe 6-7: Detecting Source Code Leakages; Recipe 6-8: Detecting Technical Data Leakages; Recipe 6-9: Detecting Abnormal Response Time Intervals. | |
520 | |a Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Hackers. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
758 | |i has work: |a Web Application Defender's Cookbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGBxJvMb8b6v4QRPktd9tC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Barnett, Ryan C. |t Web application defender's cookbook. |d Indianapolis, Ind. : Wiley, ©2013 |z 9781118362181 |w (OCoLC)795173848 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1108733 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118417058/?ar |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH25045780 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH25004563 | ||
938 | |a Books 24x7 |b B247 |n bks00051293 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1108733 | ||
938 | |a ebrary |b EBRY |n ebr10657556 | ||
938 | |a EBSCOhost |b EBSC |n 531459 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26316653 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00066819 | ||
938 | |a YBP Library Services |b YANK |n 10195923 | ||
938 | |a YBP Library Services |b YANK |n 9972080 | ||
994 | |a 92 |b IZTAP |