|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1082522887 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190117s2018 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d G3B
|d STF
|d MERER
|d OCLCF
|d OCLCQ
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492032304
|
029 |
1 |
|
|a AU@
|b 000069004316
|
035 |
|
|
|a (OCoLC)1082522887
|
037 |
|
|
|a CL0501000018
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Russell, Chad,
|e author.
|
245 |
1 |
0 |
|a Web application firewalls :
|b securing modern web applications /
|c Chad Russell.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 14, 2019).
|
520 |
|
|
|a Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains the evolution of web application firewall (WAF) technologies for countering these attacks. Developers today increasingly rely on third-party libraries for application development, but many of these libraries include vulnerabilities that attackers actively exploit. With this ebook, you'll explore the specifics of WAF functionality for filtering, monitoring, and blocking HTTP traffic to and from a web application, and learn how to incorporate WAFs into existing and planned infrastructure, whether it's a cloud, on-premise, or hybrid deployment. You'll examine: The Top 10 application layer attacks compiled by the Open Web Application Security Project (OWASP) Security vulnerabilities, including business logic attacks, distributed denial of service, online fraud, social engineering, and malware WAF core and emergent capabilities, such as XSS and sessions attack protection, SIEM integration, and malware inspection and sandboxing Security solutions and technologies that work with WAF, including API gateways, and data loss prevention solutions.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492032311/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|