Cargando…

The penetration tester's guide to web applications /

"This innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities. The book focuses on offensive security and how to attack web applications. It describes each of the Open Web Applicatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Borso, Serge (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Norwood, MA : Artech House, [2019]
Colección:Artech House information security and privacy series.
Artech House computer security series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1112088469
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cnu---unuuu
008 190710t20192019maua o 001 0 eng d
040 |a STF  |b eng  |e rda  |e pn  |c STF  |d EBLCP  |d GSU  |d YDXIT  |d OCLCF  |d AU@  |d OCLCQ  |d YDX  |d CUV  |d UKAHL  |d N$T  |d OCLCQ  |d IBI  |d COO  |d OCLCO  |d IEEEE  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1114319521  |a 1142445910  |a 1162168464  |a 1388673637 
020 |a 9781630816247  |q (electronic bk.) 
020 |a 1630816248  |q (electronic book) 
020 |z 9781630816223 
020 |z 1630816221 
029 1 |a AU@  |b 000066006828 
029 1 |a AU@  |b 000066132699 
029 1 |a AU@  |b 000067170181 
029 1 |a AU@  |b 000068653372 
035 |a (OCoLC)1112088469  |z (OCoLC)1114319521  |z (OCoLC)1142445910  |z (OCoLC)1162168464  |z (OCoLC)1388673637 
050 4 |a QA76.9.A25  |b B67 2019eb 
072 0 |a COM053000 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Borso, Serge,  |e author. 
245 1 4 |a The penetration tester's guide to web applications /  |c Serge Borso 
264 1 |a Norwood, MA :  |b Artech House,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (xii, 201 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Information security and privacy series 
490 1 |a Artech House computer security series 
588 0 |a Online resource; title from digital title page (viewed on September 30, 2019) 
500 |a Includes index 
505 0 |a 1. Introduction -- 2. OWASP A1: 2017 Injection -- 3. OWASP A2:2017 Broken authentication -- 4. OWASP A3:2017 Sensitive data exposure -- 5. OWASP A4:2017 XML external entities (XXE) -- 6. OWASP A5:2017 Broken access control -- 7. OWASP A6:2017 Security misconfiguration -- 8. OWASP A7:2017 Cross-site scripting (XSS) -- 9. OWASP A8:2017 Insecure deserialization -- 10. OWASP A9:2017 Using components with known vulnerabilities -- 11. OWASP A10:2017 Insufficient logging and monitoring -- 12. Beyond the OWASP top 10 -- 13. Testing as a consultant and adding value 
520 |a "This innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities. The book focuses on offensive security and how to attack web applications. It describes each of the Open Web Application Security Project (OWASP) top ten vulnerabilities, including broken authentication, cross-site scripting and insecure deserialization, and details how to identify and exploit each weakness. Readers learn to bridge the gap between high-risk vulnerabilities and exploiting flaws to get shell access. The book demonstrates how to work in a professional services space to produce quality and thorough testing results by detailing the requirements of providing a best-of-class penetration testing service. It offers insight into the problem of not knowing how to approach a web app pen test and the challenge of integrating a mature pen testing program into an organization. Based on the author's many years of first-hand experience, this book provides examples of how to break into user accounts, how to breach systems, and how to configure and wield penetration testing tools."--Publisher's description 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Tests d'intrusion. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
653 |a Computing & Information Technology 
653 |a EDV und Informationstechnologie 
653 |a Informatique et technologies de l'information 
653 |a Computer security 
653 |a Computersicherheit 
653 |a Sécurité informatique 
776 0 8 |i Print version:  |a Borso, Serge.  |t Penetration tester's guide to web applications.  |d Norwood, MA : Artech House, [2019]  |z 1630816221  |w (OCoLC)1090280703 
830 0 |a Artech House information security and privacy series. 
830 0 |a Artech House computer security series. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpPTGWA008/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36598893 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5848443 
938 |a EBSCOhost  |b EBSC  |n 2227829 
938 |a IEEE  |b IEEE  |n 9098780 
938 |a YBP Library Services  |b YANK  |n 300759185 
994 |a 92  |b IZTAP