Cargando…

Web application security is a stack : how to CYA (Cover Your Apps) completely /

The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application se...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vittie, Lori Mac (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridgeshire, England : IT Governance Publishing, 2015.
Colección:Fundamentals Series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_ocn905916616
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cn|||||||||
008 150309t20152015enka ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d JSTOR  |d OCLCF  |d EBLCP  |d COO  |d YDXCP  |d IDB  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d VT2  |d IOG  |d OCLCA  |d OCLCQ  |d LVT  |d RDF  |d OCLCQ  |d N$T  |d UX1  |d BRF  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 923646205  |a 928193555  |a 948892406  |a 1175632868 
020 |a 9781849287050  |q (electronic bk.) 
020 |a 1849287058  |q (electronic bk.) 
020 |a 184928704X 
020 |a 9781849287043  |q (electronic bk.) 
029 1 |a AU@  |b 000056944646 
029 1 |a CHBIS  |b 010446335 
029 1 |a CHVBK  |b 35779141X 
029 1 |a DEBBG  |b BV043735224 
035 |a (OCoLC)905916616  |z (OCoLC)923646205  |z (OCoLC)928193555  |z (OCoLC)948892406  |z (OCoLC)1175632868 
037 |a 22573/ctt14zcz7f  |b JSTOR 
050 4 |a TK5105.59  |b .V588 2015eb 
072 7 |a COM000000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Vittie, Lori Mac,  |e author. 
245 1 0 |a Web application security is a stack :  |b how to CYA (Cover Your Apps) completely /  |c Lori Mac Vittie. 
264 1 |a Cambridgeshire, England :  |b IT Governance Publishing,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource (71 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Fundamentals Series ;  |v v. 1 
588 0 |a Online resource; title from PDF title page (ebrary, viewed March 9, 2015). 
520 |a The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio. 
504 |a Includes bibliographical references. 
505 0 |a ABOUT THE AUTHOR; ACKNOWLEDGEMENTS; CONTENTS; CHAPTER 1: INTRODUCTION; The modern threat ; CYA: Cover Your Apps ; CHAPTER 2: ATTACK SURFACE ; The web application security stack ; Application: Platform ; Transport protocols ; Secure transport protocols ; Web application protocols ; Application: Logic ; Application: Data ; CHAPTER 3: THREAT VECTORS ; Threat vector: Data ; Exfiltration ; Corruption ; Threat vector: Protocols ; Cross-site scripting (XSS) ; Cross-site request forgery (CSRF) ; HTTP request smuggling ; HTTP response splitting ; HTTP header vulnerabilities 
505 8 |a Threat vector: Availability HTTP GET flood; Slowloris; Slow HTTP POST; CHAPTER 4: THREAT MITIGATION ; The three Cs of application security ; Client ; Context ; Content ; Inbound threat mitigation ; Filtering ; Behavioural analysis ; Signatures and anomalies ; Client-based assistance ; Outbound threat mitigation ; Data leak prevention ; Expectation analysis ; CHAPTER 5: CONCLUSION; ITG RESOURCES 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Vittie, Lori Mac.  |t Web application security is a stack : how to CYA (Cover Your Apps) completely.  |d Cambridgeshire, England : IT Governance Publishing, ©2015  |h 71 pages  |z 9781849287043 
830 0 |a Fundamentals Series. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt155j4gk  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3015818 
938 |a ebrary  |b EBRY  |n ebr11022439 
938 |a EBSCOhost  |b EBSC  |n 957887 
938 |a Internet Archive  |b INAR  |n webapplicationse0000vitt 
938 |a YBP Library Services  |b YANK  |n 12302806 
994 |a 92  |b IZTAP