Web application security is a stack : how to CYA (Cover Your Apps) completely /
The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application se...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridgeshire, England :
IT Governance Publishing,
2015.
|
Colección: | Fundamentals Series.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- ABOUT THE AUTHOR; ACKNOWLEDGEMENTS; CONTENTS; CHAPTER 1: INTRODUCTION; The modern threat ; CYA: Cover Your Apps ; CHAPTER 2: ATTACK SURFACE ; The web application security stack ; Application: Platform ; Transport protocols ; Secure transport protocols ; Web application protocols ; Application: Logic ; Application: Data ; CHAPTER 3: THREAT VECTORS ; Threat vector: Data ; Exfiltration ; Corruption ; Threat vector: Protocols ; Cross-site scripting (XSS) ; Cross-site request forgery (CSRF) ; HTTP request smuggling ; HTTP response splitting ; HTTP header vulnerabilities
- Threat vector: Availability HTTP GET flood; Slowloris; Slow HTTP POST; CHAPTER 4: THREAT MITIGATION ; The three Cs of application security ; Client ; Context ; Content ; Inbound threat mitigation ; Filtering ; Behavioural analysis ; Signatures and anomalies ; Client-based assistance ; Outbound threat mitigation ; Data leak prevention ; Expectation analysis ; CHAPTER 5: CONCLUSION; ITG RESOURCES