Cargando…

Web application vulnerabilities : detect, exploit, prevent /

"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to f...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cross, Michael, 1965- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress Pub., ©2007.
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • Ch. 1. Introduction to Web Application Hacking
  • Ch. 2. Information Gathering Techniques
  • Ch. 3. Introduction to Server Side Input Validation Issues
  • Ch. 4. Client-Side Exploit Frameworks
  • Ch. 5. Web-Based Malware
  • Ch. 6. Web Server and Web Application Testing with BackTrack
  • Ch. 7. Securing Web Based Services.