|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn749852776 |
003 |
OCoLC |
005 |
20231117044620.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110906s2011 ne a ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OCLCQ
|d CNCGM
|d COO
|d B24X7
|d TEF
|d DEBSZ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCF
|d ZZAND
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OCLCA
|d WYU
|d LEAUB
|d OL$
|d VT2
|d VLY
|d UAB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 752616117
|a 765144202
|a 775115803
|a 916427122
|a 1063000440
|a 1103264533
|a 1129348663
|a 1153019973
|a 1162260502
|a 1192338416
|a 1240518355
|a 1256306317
|
020 |
|
|
|a 9781597496049
|q (electronic bk.)
|
020 |
|
|
|a 1597496049
|q (electronic bk.)
|
020 |
|
|
|a 9781597496056
|q (ebook)
|
020 |
|
|
|a 1597496057
|q (ebook)
|
020 |
|
|
|a 1282956051
|
020 |
|
|
|a 9781282956056
|
020 |
|
|
|a 9786612956058
|
020 |
|
|
|a 6612956054
|
035 |
|
|
|a (OCoLC)749852776
|z (OCoLC)752616117
|z (OCoLC)765144202
|z (OCoLC)775115803
|z (OCoLC)916427122
|z (OCoLC)1063000440
|z (OCoLC)1103264533
|z (OCoLC)1129348663
|z (OCoLC)1153019973
|z (OCoLC)1162260502
|z (OCoLC)1192338416
|z (OCoLC)1240518355
|z (OCoLC)1256306317
|
050 |
|
4 |
|a QA76.625
|b .H46 2011eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Heiderich, Mario.
|
245 |
1 |
0 |
|a Web application obfuscation :
|b -/WAFs. Evasion. Filters//alert (/Obfuscation/)- /
|c Mario Heiderich [and others].
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Elsevier/Syngress,
|c �2011.
|
300 |
|
|
|a 1 online resource (xiii, 275 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more.
|
505 |
0 |
|
|a Introduction -- HTML -- JavaScript and VBScript -- Nonalphanumeric JavaScript -- CSS -- PHP -- SQL -- Web application firewalls and client-side filters -- Mitigating bypasses and attacks -- Future developments.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Internet programming.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Web site development.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Programmation Internet.
|0 (CaQQLa)201-0304374
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Sites Web
|x D�eveloppement.
|0 (CaQQLa)201-0316399
|
650 |
|
6 |
|a Logiciels d'application
|x D�eveloppement.
|0 (CaQQLa)201-0279367
|
650 |
|
6 |
|a Cryptographie.
|0 (CaQQLa)201-0039807
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Cryptography
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Internet programming
|2 fast
|0 (OCoLC)fst00977281
|
650 |
|
7 |
|a Web site development
|2 fast
|0 (OCoLC)fst01173243
|
776 |
0 |
8 |
|i Print version:
|a Heiderich, Mario.
|t Web application obfuscation.
|d Amsterdam ; Boston : Elsevier/Syngress, �2011
|z 9781597496049
|w (DLC) 2010042097
|w (OCoLC)641537773
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597496049
|z Texto completo
|