Cargando…

Web Application Defender's Cookbook : Battling Hackers and Protecting Users.

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book:...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Barnett, Ryan C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Pub., Inc., 2013.
Edición:1. ed.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn841481395
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 130502s2013 inua ob 001 0 eng d
040 |a DKDLA  |b eng  |e pn  |c DKDLA  |d OCLCO  |d LLB  |d E7B  |d IDEBK  |d OCLCF  |d N$T  |d TEFOD  |d YDXCP  |d UKMGB  |d UMI  |d OCLCA  |d OCLCO  |d EBLCP  |d STF  |d B24X7  |d COO  |d DEBSZ  |d RECBK  |d OCLCO  |d TEFOD  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d NKT  |d OCLCQ  |d OCLCO  |d AZK  |d CNNLC  |d OCLCO  |d MOR  |d CCO  |d PIFAG  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d ZCU  |d OCLCA  |d U3W  |d OCLCA  |d COCUF  |d REB  |d CEF  |d WRM  |d OCLCQ  |d KSU  |d NRAMU  |d ICG  |d INT  |d DEBBG  |d VT2  |d OCLCQ  |d WYU  |d S9I  |d OCLCQ  |d UAB  |d A6Q  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d U@J  |d OCLCQ  |d BOL  |d UKCRE  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 016162686  |2 Uk 
019 |a 823719322  |a 828678288  |a 844973133  |a 865012359  |a 879653122  |a 883144846  |a 961567586  |a 962678167  |a 988438818  |a 992016703  |a 1026439361  |a 1037793837  |a 1038588489  |a 1045505368  |a 1055407574  |a 1065982782  |a 1081209616  |a 1083554106  |a 1103268537  |a 1105724949  |a 1114380747  |a 1129373491  |a 1132915980  |a 1142772821  |a 1153045255  |a 1192348905  |a 1228590167  |a 1240508715 
020 |a 9781118362181  |q (pbk. ;  |q alk. paper) 
020 |a 1118362187  |q (pbk. ;  |q alk. paper) 
020 |a 9781118568712  |q (e-book) 
020 |a 1118568710  |q (e-book) 
020 |a 9781118417058  |q (electronic bk.) 
020 |a 1118417054  |q (electronic bk.) 
020 |a 9781118568651  |q (ebk) 
020 |a 1118568656  |q (ebk) 
028 0 1 |a EB00066819  |b Recorded Books 
029 1 |a AU@  |b 000052281586 
029 1 |a AU@  |b 000053029717 
029 1 |a CHNEW  |b 000600015 
029 1 |a DEBBG  |b BV041430551 
029 1 |a DEBBG  |b BV041913049 
029 1 |a DEBBG  |b BV044049896 
029 1 |a DEBSZ  |b 397460872 
029 1 |a DEBSZ  |b 398263418 
029 1 |a GBVCP  |b 1014934486 
029 1 |a GBVCP  |b 785368531 
029 1 |a NZ1  |b 14977012 
029 1 |a AU@  |b 000055885477 
035 |a (OCoLC)841481395  |z (OCoLC)823719322  |z (OCoLC)828678288  |z (OCoLC)844973133  |z (OCoLC)865012359  |z (OCoLC)879653122  |z (OCoLC)883144846  |z (OCoLC)961567586  |z (OCoLC)962678167  |z (OCoLC)988438818  |z (OCoLC)992016703  |z (OCoLC)1026439361  |z (OCoLC)1037793837  |z (OCoLC)1038588489  |z (OCoLC)1045505368  |z (OCoLC)1055407574  |z (OCoLC)1065982782  |z (OCoLC)1081209616  |z (OCoLC)1083554106  |z (OCoLC)1103268537  |z (OCoLC)1105724949  |z (OCoLC)1114380747  |z (OCoLC)1129373491  |z (OCoLC)1132915980  |z (OCoLC)1142772821  |z (OCoLC)1153045255  |z (OCoLC)1192348905  |z (OCoLC)1228590167  |z (OCoLC)1240508715 
037 |a CL0500000428  |b Safari Books Online 
037 |a 9599D8D7-C007-49BD-B64E-14CCD7232DB3  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b B37 2013eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Barnett, Ryan C. 
245 1 0 |a Web Application Defender's Cookbook :  |b Battling Hackers and Protecting Users. 
250 |a 1. ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub., Inc.,  |c 2013. 
300 |a 1 online resource (xxix, 522 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome.  |2 rdacc  |0 http://rdaregistry.info/termList/RDAColourContent/1003 
347 |a data file 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Part I: Preparing the Battle Space; Chapter 1: Application Fortification; Recipe 1-1: Real-time Application Profiling; Recipe 1-2: Preventing Data Manipulation with Cryptographic Hash Tokens; Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS); Recipe 1-4: Integrating Intrusion Detection System Signatures; Recipe 1-5: Using Bayesian Attack Payload Detection; HTTP Audit Logging; Recipe 1-6: Enable Full HTTP Audit Logging; Recipe 1-7: Logging Only Relevant Transactions; Recipe 1-9: Obscuring Sensitive Data in Logs. 
505 8 |a Recipe 1-10: Sending Alerts to a Central Log Host Using SyslogRecipe 1-11: Using the ModSecurity AuditConsole; Recipe 1-8: Ignoring Requests for Static Content; Chapter 2: Vulnerability Identification and Remediation; Internally Developed Applications; Externally Developed Applications; Virtual Patching; Recipe 2-1: Passive Vulnerability Identification; Active Vulnerability Identification; Recipe 2-2: Active Vulnerability Identification; Manual Vulnerability Remediation; Recipe 2-3: Manual Scan Result Conversion; Recipe 2-4: Automated Scan Result Conversion. 
505 8 |a Recipe 2-5: Real-time Resource Assessments and Virtual PatchingChapter 3: Poisoned Pawns (Hacker Traps); Honeytrap Concepts; Recipe 3-1: Adding Honeypot Ports; Recipe 3-2: Adding Fake robots.txt Disallow Entries; Recipe 3-3: Adding Fake HTML Comments; Recipe 3-4: Adding Fake Hidden Form Fields; Recipe 3-5: Adding Fake Cookies; Part II: Asymmetric Warfare; Chapter 4: Reputation and Third-Party Correlation; Suspicious Source Identification; Recipe 4-1: Analyzing the Client's Geographic Location Data; Recipe 4-2: Identifying Suspicious Open Proxy Usage. 
505 8 |a Recipe 4-3: Utilizing Real-time Blacklist Lookups (RBL)Recipe 4-4: Running Your Own RBL; Recipe 4-5: Detecting Malicious Links; Chapter 5: Request Data Analysis; Request Data Acquisition; Recipe 5-1: Request Body Access; Recipe 5-2: Identifying Malformed Request Bodies; Recipe 5-3: Normalizing Unicode; Recipe 5-4: Identifying Use of Multiple Encodings; Recipe 5-5: Identifying Encoding Anomalies; Input Validation Anomalies; Recipe 5-6: Detecting Request Method Anomalies; Recipe 5-7: Detecting Invalid URI Data; Recipe 5-8: Detecting Request Header Anomalies. 
505 8 |a Recipe 5-9: Detecting Additional ParametersRecipe 5-10: Detecting Missing Parameters; Recipe 5-11: Detecting Duplicate Parameter Names; Recipe 5-12: Detecting Parameter Payload Size Anomalies; Recipe 5-13: Detecting Parameter Character Class Anomalies; Chapter 6: Response Data Analysis; Recipe 6-1: Detecting Response Header Anomalies; Recipe 6-2: Detecting Response Header Information Leakages; Recipe 6-3: Response Body Access; Recipe 6-7: Detecting Source Code Leakages; Recipe 6-8: Detecting Technical Data Leakages; Recipe 6-9: Detecting Abnormal Response Time Intervals. 
520 |a Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Hackers. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Pirates informatiques. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Web Application Defender's Cookbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGBxJvMb8b6v4QRPktd9tC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Barnett, Ryan C.  |t Web application defender's cookbook.  |d Indianapolis, Ind. : Wiley, ©2013  |z 9781118362181  |w (OCoLC)795173848 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1108733  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118417058/?ar  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25045780 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25004563 
938 |a Books 24x7  |b B247  |n bks00051293 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1108733 
938 |a ebrary  |b EBRY  |n ebr10657556 
938 |a EBSCOhost  |b EBSC  |n 531459 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26316653 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00066819 
938 |a YBP Library Services  |b YANK  |n 10195923 
938 |a YBP Library Services  |b YANK  |n 9972080 
994 |a 92  |b IZTAP