Cargando…

Web security : a whitehat perspective /

"This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applicati...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wu, Hanqing (Autor), Zhao, Liz (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Taylor & Francis, CRC Press, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn906026040
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 150402t20152015flua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d E7B  |d VLB  |d UMI  |d CDX  |d COO  |d OCLCO  |d CRCPR  |d IDEBK  |d B24X7  |d DEBBG  |d OCLCO  |d EBLCP  |d OCLCQ  |d DEBSZ  |d YDXCP  |d OCLCQ  |d IDB  |d Z5A  |d S4S  |d NLE  |d LIV  |d OCLCQ  |d MERUC  |d UAB  |d OCLCQ  |d OCLCA  |d VT2  |d OCLCA  |d OCLCQ  |d CEF  |d U3W  |d OCLCQ  |d INT  |d OCLCQ  |d AU@  |d OCLCF  |d OCLCQ  |d UKMGB  |d OCLCQ  |d WYU  |d TYFRS  |d LEAUB  |d OCLCQ  |d STF  |d UKAHL  |d OCLCQ  |d NLW  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ 
016 7 |a 018354598  |2 Uk 
019 |a 908078380  |a 908416913  |a 908635409  |a 911069822  |a 989061625  |a 1040032422 
020 |a 9781466592629  |q (electronic bk.) 
020 |a 1466592621  |q (electronic bk.) 
020 |z 9781466592612 
020 |z 1466592613 
029 1 |a AU@  |b 000054999400 
029 1 |a AU@  |b 000062349368 
029 1 |a DEBBG  |b BV042683343 
029 1 |a DEBBG  |b BV043606895 
029 1 |a DEBSZ  |b 446585483 
029 1 |a DEBSZ  |b 453327982 
029 1 |a DEBSZ  |b 463015355 
029 1 |a UKMGB  |b 018354598 
035 |a (OCoLC)906026040  |z (OCoLC)908078380  |z (OCoLC)908416913  |z (OCoLC)908635409  |z (OCoLC)911069822  |z (OCoLC)989061625  |z (OCoLC)1040032422 
037 |a CL0500000589  |b Safari Books Online 
050 4 |a TK5105.59  |b .H3536 2015eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a BUS041000  |a COM053000  |a COM060000  |2 bisacsh 
049 |a UAMI 
100 1 |a Wu, Hanqing,  |e author. 
245 1 0 |a Web security :  |b a whitehat perspective /  |c Wu Hanqing, Liz Zhao. 
264 1 |a Boca Raton :  |b Taylor & Francis, CRC Press,  |c [2015] 
264 4 |c ©20 
264 4 |c ©2015 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations."--  |c Provided by publisher 
520 |a "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Section 1. Our view of the security world -- section 2. Safetyon the client script -- section 3. Application on the server side -- section 4. Safety operations of internet companies. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |v Popular works. 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 0 |a World Wide Web  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Ouvrages de vulgarisation. 
650 6 |a Sécurité informatique. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
650 7 |a World Wide Web  |x Security measures.  |2 fast  |0 (OCoLC)fst01181329 
655 7 |a Popular works.  |2 fast  |0 (OCoLC)fst01423846 
700 1 |a Zhao, Liz,  |e author. 
776 0 8 |i Print version:  |a Hanqing, Wu.  |t Web security  |z 9781466592612  |w (DLC) 2014022587  |w (OCoLC)881387932 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466592612/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24681147 
938 |a Books 24x7  |b B247  |n bks00051953 
938 |a Coutts Information Services  |b COUT  |n 31345184 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4002946 
938 |a ebrary  |b EBRY  |n ebr11041797 
938 |a EBSCOhost  |b EBSC  |n 974054 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31345184 
938 |a Taylor & Francis  |b TAFR  |n 9780429168239 
938 |a Taylor & Francis  |b TAFR  |n AUP0KE23383PDF 
938 |a YBP Library Services  |b YANK  |n 11378656 
938 |a YBP Library Services  |b YANK  |n 12585141 
994 |a 92  |b IZTAP