Cargando…

Web Hacking : Attacks and Defense.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: McClure, Stuart (Autor), Shah, Saumil (Autor), Shah, Shreeraj (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Old Tappan : Addison Wesley Professional, Pearson Education [distributor] Aug. 2002 ;
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1064905401
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 020521e20020808maua o 000 0 eng d
040 |a WYU  |b eng  |e pn  |c WYU  |d OCLCQ  |d CEF  |d OCLCO  |d VT2  |d UAB  |d OCLCQ  |d OCLCO 
019 |a 1103256974 
020 |a 0201761769 
020 |a 9780201761764 
020 |z 9780201761764 
020 |z 0201761769  |q (Trade Paper) 
024 1 |a 785342761764 
024 3 |a 9780201761764 
035 |a (OCoLC)1064905401  |z (OCoLC)1103256974 
037 |b 01157628 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a McClure, Stuart,  |e author. 
240 1 0 |a Web Hacking (Online) 
245 1 0 |a Web Hacking :  |b Attacks and Defense. 
260 |a Boston :  |b Addison Wesley Professional,  |c Aug. 2002 ;  |a Old Tappan :  |b Pearson Education [distributor] 
300 |a 1 online resource (528 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 8 |a Annotation  |b In the evolution of hacking, firewalls are a mere speed bump. Hacking continues to develop, becoming ever more sophisticated, adapting and growing in ingenuity as well as in the damage that results. Web attacks running over web ports strike with enormous impact. Stuart McClure's new book focuses on Web hacking, an area where organizations are particularly vulnerable. The material covers the web commerce "playground', describing web languages and protocols, web and database servers, and payment systems. The authors bring unparalleled insight to both well- known and lesser known web vulnerabilities. They show the dangerous range of the many different attacks web hackers harbor in their bag of tricks -- including buffer overflows, the most wicked of attacks, plus other advanced attacks. The book features complete methodologies, including techniques and attacks, countermeasures, tools, plus case studies and web attack scenarios showing how different attacks work and why they work. 
521 |a Scholarly & Professional  |b Addison Wesley Professional. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web sites  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Web sites  |x Security measures  |2 fast 
700 1 |a Shah, Saumil,  |e author. 
700 1 |a Shah, Shreeraj,  |e author. 
776 0 8 |i Print version:  |a McClure, Stuart.  |s Web Hacking (Online).  |t Web Hacking.  |d Boston : Addison Wesley Professional, Aug. 2002 ; Old Tappan : Pearson Education [distributor]  |w (DLC) 2002107711 
856 4 0 |u https://learning.oreilly.com/library/view/~/0201761769/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP