Cargando…

Web application vulnerabilities : detect, exploit, prevent /

"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to f...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cross, Michael, 1965- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress Pub., ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn298103826
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 081212s2007 maua o 001 0 eng d
040 |a YUS  |b eng  |e pn  |c YUS  |d N$T  |d YDXCP  |d UAB  |d IDEBK  |d E7B  |d OCLCQ  |d UMI  |d CEF  |d NHM  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d VLB  |d OCLCQ  |d UIU  |d OPELS  |d DKDLA  |d OCLCQ  |d COO  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCA  |d OCLCQ  |d OCLCF  |d JBG  |d D6H  |d OCLCQ  |d VTS  |d AU@  |d S9I  |d STF  |d LEAUB  |d M8D  |d WYU  |d VT2  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 190824302  |a 228148127  |a 268792862  |a 319430078  |a 473205423  |a 647692001  |a 1044582401  |a 1062879538  |a 1103281072  |a 1129378669  |a 1152977254  |a 1179796542 
020 |a 9780080556642  |q (electronic bk.) 
020 |a 0080556647  |q (electronic bk.) 
020 |z 1597492094 
020 |z 9781597492096 
029 1 |a AU@  |b 000043178438 
029 1 |a AU@  |b 000043568350 
029 1 |a AU@  |b 000051426832 
029 1 |a AU@  |b 000053251998 
029 1 |a AU@  |b 000062553474 
029 1 |a CHBIS  |b 006041563 
029 1 |a CHNEW  |b 001007833 
029 1 |a CHVBK  |b 199623422 
029 1 |a DEBBG  |b BV042305691 
029 1 |a DEBBG  |b BV043099549 
029 1 |a DEBSZ  |b 355443597 
029 1 |a DEBSZ  |b 405318200 
029 1 |a DEBSZ  |b 422157147 
029 1 |a GBVCP  |b 802747086 
029 1 |a HEBIS  |b 291513891 
029 1 |a NZ1  |b 12541572 
029 1 |a NZ1  |b 15189637 
035 |a (OCoLC)298103826  |z (OCoLC)190824302  |z (OCoLC)228148127  |z (OCoLC)268792862  |z (OCoLC)319430078  |z (OCoLC)473205423  |z (OCoLC)647692001  |z (OCoLC)1044582401  |z (OCoLC)1062879538  |z (OCoLC)1103281072  |z (OCoLC)1129378669  |z (OCoLC)1152977254  |z (OCoLC)1179796542 
037 |a CL0500000038  |b Safari Books Online 
050 4 |a QA76.76.A65  |b W428 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Web application vulnerabilities :  |b detect, exploit, prevent /  |c Michael Cross [and others]. 
260 |a Burlington, Mass. :  |b Syngress Pub.,  |c ©2007. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
505 0 |a Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services. 
520 1 |a "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket 
588 0 |a Print version record. 
500 |a Includes index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Application software  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Cross, Michael,  |d 1965-  |4 aut 
776 0 8 |i Print version:  |a Cross, Michael, 1965-  |t Web application vunerabilities.  |d Burlington, MA : Syngress, ©2007  |z 1597492094  |z 9781597492096  |w (OCoLC)171111159 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492096/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a Books 24x7  |b B247  |n bks00025456 
938 |a EBSCOhost  |b EBSC  |n 214750 
938 |a YBP Library Services  |b YANK  |n 2758446 
994 |a 92  |b IZTAP