Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Annotation
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress,
©2001.
©2001 |
Colección: | Global knowledge professional reference.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | OR_ocm51649794 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030214s2001 maua of 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d VVN |d MERUC |d CCO |d E7B |d REDDC |d DKDLA |d NNM |d CSU |d OCLCQ |d UMI |d OCL |d DEBBG |d IDEBK |d DEBSZ |d C6I |d COO |d OCLCQ |d AZK |d COCUF |d AGLDB |d CNNOR |d MOR |d PIFBR |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d VTS |d CEF |d NRAMU |d OCLCQ |d INT |d VT2 |d TOF |d OCLCQ |d AU@ |d A6Q |d OCLCQ |d UKCRE |d AJS |d OCLCO |d OCLCQ |d INARC |d OCLCQ | ||
015 | |a GBA1X7773 |2 bnb | ||
016 | 7 | |a 1928994318 |2 Uk | |
019 | |a 48657738 |a 70725373 |a 171131380 |a 488335789 |a 559786728 |a 646706614 |a 648302018 |a 722109124 |a 740948554 |a 910938038 |a 961584615 |a 961663775 |a 962580020 |a 962709675 |a 988518520 |a 992017892 |a 992115539 |a 1035656679 |a 1037421984 |a 1038700423 |a 1045554961 |a 1053056084 |a 1055232232 |a 1055341811 |a 1058159295 |a 1076314523 |a 1081212564 |a 1153469719 |a 1156337222 |a 1192346693 |a 1228596439 |a 1240537912 | ||
020 | |a 1931836388 |q (electronic bk.) | ||
020 | |a 9781931836388 |q (electronic bk.) | ||
020 | |a 9781928994312 |q (pbk.) | ||
020 | |a 1928994318 |q (pbk.) | ||
020 | |a 008047988X | ||
020 | |a 9780080479880 | ||
020 | |a 0080478131 | ||
020 | |a 9780080478135 | ||
020 | |z 9781928994329 | ||
029 | 1 | |a AU@ |b 000050963034 | |
029 | 1 | |a AU@ |b 000051425782 | |
029 | 1 | |a DEBBG |b BV042683670 | |
029 | 1 | |a DEBBG |b BV043072316 | |
029 | 1 | |a DEBSZ |b 422447277 | |
029 | 1 | |a DEBSZ |b 44658875X | |
029 | 1 | |a GBVCP |b 800928318 | |
035 | |a (OCoLC)51649794 |z (OCoLC)48657738 |z (OCoLC)70725373 |z (OCoLC)171131380 |z (OCoLC)488335789 |z (OCoLC)559786728 |z (OCoLC)646706614 |z (OCoLC)648302018 |z (OCoLC)722109124 |z (OCoLC)740948554 |z (OCoLC)910938038 |z (OCoLC)961584615 |z (OCoLC)961663775 |z (OCoLC)962580020 |z (OCoLC)962709675 |z (OCoLC)988518520 |z (OCoLC)992017892 |z (OCoLC)992115539 |z (OCoLC)1035656679 |z (OCoLC)1037421984 |z (OCoLC)1038700423 |z (OCoLC)1045554961 |z (OCoLC)1053056084 |z (OCoLC)1055232232 |z (OCoLC)1055341811 |z (OCoLC)1058159295 |z (OCoLC)1076314523 |z (OCoLC)1081212564 |z (OCoLC)1153469719 |z (OCoLC)1156337222 |z (OCoLC)1192346693 |z (OCoLC)1228596439 |z (OCoLC)1240537912 | ||
050 | 4 | |a QA76.9.A25 |b H33 2001eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 21 |
049 | |a UAMI | ||
245 | 0 | 0 | |a Hack proofing your Web applications : |b the only way to stop a hacker is to think like one. |
260 | |a Rockland, MA : |b Syngress, |c ©2001. | ||
264 | 4 | |c ©2001 | |
300 | |a 1 online resource (xxviii, 586 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Global knowledge professional reference | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | 8 | |a Annotation |b From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure?Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programsUnique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs. | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 0 | |a Web sites |x Design |v Handbooks, manuals, etc. | |
650 | 6 | |a Sécurité informatique |v Guides, manuels, etc. | |
650 | 6 | |a Sites Web |x Conception |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Web sites |x Design. |2 fast |0 (OCoLC)fst01173252 | |
655 | 7 | |a Handbooks and manuals. |2 fast |0 (OCoLC)fst01423877 | |
655 | 7 | |a Handbooks and manuals. |2 lcgft | |
776 | 0 | 8 | |i Print version: |t Hack proofing your Web applications. |d Rockland, MA : Syngress, ©2001 |z 1928994318 |w (OCoLC)47250133 |
830 | 0 | |a Global knowledge professional reference. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781928994312/?ar |z Texto completo (Requiere registro previo con correo institucional) |
938 | |a Internet Archive |b INAR |n hackproofingyour0000unse_h4y5 | ||
938 | |a EBSCOhost |b EBSC |n 75884 | ||
938 | |a YBP Library Services |b YANK |n 2361829 | ||
938 | |a YBP Library Services |b YANK |n 2613340 | ||
994 | |a 92 |b IZTAP |