|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn905916616 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
150309t20152015enka ob 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d JSTOR
|d OCLCF
|d EBLCP
|d COO
|d YDXCP
|d IDB
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d VT2
|d IOG
|d OCLCA
|d OCLCQ
|d LVT
|d RDF
|d OCLCQ
|d N$T
|d UX1
|d BRF
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 923646205
|a 928193555
|a 948892406
|a 1175632868
|
020 |
|
|
|a 9781849287050
|q (electronic bk.)
|
020 |
|
|
|a 1849287058
|q (electronic bk.)
|
020 |
|
|
|a 184928704X
|
020 |
|
|
|a 9781849287043
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000056944646
|
029 |
1 |
|
|a CHBIS
|b 010446335
|
029 |
1 |
|
|a CHVBK
|b 35779141X
|
029 |
1 |
|
|a DEBBG
|b BV043735224
|
035 |
|
|
|a (OCoLC)905916616
|z (OCoLC)923646205
|z (OCoLC)928193555
|z (OCoLC)948892406
|z (OCoLC)1175632868
|
037 |
|
|
|a 22573/ctt14zcz7f
|b JSTOR
|
050 |
|
4 |
|a TK5105.59
|b .V588 2015eb
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vittie, Lori Mac,
|e author.
|
245 |
1 |
0 |
|a Web application security is a stack :
|b how to CYA (Cover Your Apps) completely /
|c Lori Mac Vittie.
|
264 |
|
1 |
|a Cambridgeshire, England :
|b IT Governance Publishing,
|c 2015.
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (71 pages) :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Fundamentals Series ;
|v v. 1
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed March 9, 2015).
|
520 |
|
|
|a The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a ABOUT THE AUTHOR; ACKNOWLEDGEMENTS; CONTENTS; CHAPTER 1: INTRODUCTION; The modern threat ; CYA: Cover Your Apps ; CHAPTER 2: ATTACK SURFACE ; The web application security stack ; Application: Platform ; Transport protocols ; Secure transport protocols ; Web application protocols ; Application: Logic ; Application: Data ; CHAPTER 3: THREAT VECTORS ; Threat vector: Data ; Exfiltration ; Corruption ; Threat vector: Protocols ; Cross-site scripting (XSS) ; Cross-site request forgery (CSRF) ; HTTP request smuggling ; HTTP response splitting ; HTTP header vulnerabilities
|
505 |
8 |
|
|a Threat vector: Availability HTTP GET flood; Slowloris; Slow HTTP POST; CHAPTER 4: THREAT MITIGATION ; The three Cs of application security ; Client ; Context ; Content ; Inbound threat mitigation ; Filtering ; Behavioural analysis ; Signatures and anomalies ; Client-based assistance ; Outbound threat mitigation ; Data leak prevention ; Expectation analysis ; CHAPTER 5: CONCLUSION; ITG RESOURCES
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Vittie, Lori Mac.
|t Web application security is a stack : how to CYA (Cover Your Apps) completely.
|d Cambridgeshire, England : IT Governance Publishing, ©2015
|h 71 pages
|z 9781849287043
|
830 |
|
0 |
|a Fundamentals Series.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt155j4gk
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3015818
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11022439
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 957887
|
938 |
|
|
|a Internet Archive
|b INAR
|n webapplicationse0000vitt
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12302806
|
994 |
|
|
|a 92
|b IZTAP
|