|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1064905401 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
020521e20020808maua o 000 0 eng d |
040 |
|
|
|a WYU
|b eng
|e pn
|c WYU
|d OCLCQ
|d CEF
|d OCLCO
|d VT2
|d UAB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1103256974
|
020 |
|
|
|a 0201761769
|
020 |
|
|
|a 9780201761764
|
020 |
|
|
|z 9780201761764
|
020 |
|
|
|z 0201761769
|q (Trade Paper)
|
024 |
1 |
|
|a 785342761764
|
024 |
3 |
|
|a 9780201761764
|
035 |
|
|
|a (OCoLC)1064905401
|z (OCoLC)1103256974
|
037 |
|
|
|b 01157628
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a McClure, Stuart,
|e author.
|
240 |
1 |
0 |
|a Web Hacking (Online)
|
245 |
1 |
0 |
|a Web Hacking :
|b Attacks and Defense.
|
260 |
|
|
|a Boston :
|b Addison Wesley Professional,
|c Aug. 2002 ;
|a Old Tappan :
|b Pearson Education [distributor]
|
300 |
|
|
|a 1 online resource (528 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
8 |
|
|a Annotation
|b In the evolution of hacking, firewalls are a mere speed bump. Hacking continues to develop, becoming ever more sophisticated, adapting and growing in ingenuity as well as in the damage that results. Web attacks running over web ports strike with enormous impact. Stuart McClure's new book focuses on Web hacking, an area where organizations are particularly vulnerable. The material covers the web commerce "playground', describing web languages and protocols, web and database servers, and payment systems. The authors bring unparalleled insight to both well- known and lesser known web vulnerabilities. They show the dangerous range of the many different attacks web hackers harbor in their bag of tricks -- including buffer overflows, the most wicked of attacks, plus other advanced attacks. The book features complete methodologies, including techniques and attacks, countermeasures, tools, plus case studies and web attack scenarios showing how different attacks work and why they work.
|
521 |
|
|
|a Scholarly & Professional
|b Addison Wesley Professional.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web sites
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Web sites
|x Security measures
|2 fast
|
700 |
1 |
|
|a Shah, Saumil,
|e author.
|
700 |
1 |
|
|a Shah, Shreeraj,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a McClure, Stuart.
|s Web Hacking (Online).
|t Web Hacking.
|d Boston : Addison Wesley Professional, Aug. 2002 ; Old Tappan : Pearson Education [distributor]
|w (DLC) 2002107711
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0201761769/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|