Cargando…

Web application security : exploitation and countermeasures for modern web applications /

While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking-until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hoffman, Andrew (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1143462121
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 200309s2020 xx o 000 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d N$T  |d EBLCP  |d UKAHL  |d OCLCQ  |d UMI  |d OCLCF  |d TEFOD  |d MNW  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1143617840  |a 1143629088  |a 1151013439  |a 1151750554  |a 1152894784  |a 1155268600  |a 1155872104  |a 1156738212  |a 1175705547  |a 1191191035 
020 |a 9781492053088  |q (electronic bk.) 
020 |a 1492053082  |q (electronic bk.) 
020 |a 9781492053064 
020 |a 1492053066 
020 |z 1492053112 
020 |z 9781492053118 
029 1 |a AU@  |b 000071521026 
035 |a (OCoLC)1143462121  |z (OCoLC)1143617840  |z (OCoLC)1143629088  |z (OCoLC)1151013439  |z (OCoLC)1151750554  |z (OCoLC)1152894784  |z (OCoLC)1155268600  |z (OCoLC)1155872104  |z (OCoLC)1156738212  |z (OCoLC)1175705547  |z (OCoLC)1191191035 
037 |a CL0501000105  |b Safari Books Online 
037 |a FC62D4AF-16E8-41FC-B627-E0A58AD568AB  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Hoffman, Andrew,  |e author. 
245 1 0 |a Web application security :  |b exploitation and countermeasures for modern web applications /  |c Andrew Hoffman. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc,  |c 2020. 
264 4 |c ©2020 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a The history of software security -- Part I. Recon. Introduction to web application reconnaissance -- The structure of a modern web application -- Finding subdomains -- API analysis -- Identifying third-party dependencies -- Identifying weak points in application architecture -- Part II. Offense. Introduction to hacking web applications -- Cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- XML external entity (XXE) -- Injection -- Denial of service (DoS) -- Exploiting third-party dependencies -- Part III. Defense. Securing modern web applications -- Secure application architecture -- Reviewing code for security -- Vulnerability discovery -- vulnerability management -- Defending against XSS attacks -- Defending against CSRF attacks -- Defending against XXE -- Defending against injection -- Defending against DoS -- Securing third-party dependencies. 
520 |a While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking-until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You'll learn methods for effectively researching and analyzing modern web applications-including those you don't have direct access to. You'll also learn how to break into web applications using the latest hacking techniques. Finally, you'll learn how to develop mitigations for use in your own web applications to protect against hackers. Explore common vulnerabilities plaguing today's web applications Learn essential hacking techniques attackers use to exploit applications Map and document web applications for which you don't have direct access Develop and deploy customized exploits that can bypass common defenses Develop and deploy mitigations to protect your applications against hackers Integrate secure coding best practices into your development lifecycle Get practical tips to help you improve the overall security of your web applications. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a World Wide Web  |x Security measures. 
650 0 |a Application software. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application. 
650 7 |a Application software  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a World Wide Web  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 1492053112  |z 9781492053118  |w (OCoLC)1129100189 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492053101/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38069254 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37294790 
938 |a EBSCOhost  |b EBSC  |n 2384857 
938 |a YBP Library Services  |b YANK  |n 301136311 
994 |a 92  |b IZTAP