Cargando…

Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.

Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Li...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Burnett, Mark
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington : Syngress Pub., 2004.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn437181461
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|---|||||
008 090817s2004 vtu o 000 0 eng d
040 |a MERUC  |b eng  |e pn  |c MERUC  |d EBLCP  |d IDEBK  |d OCLCQ  |d UKDOC  |d OCLCQ  |d TEFOD  |d YDXCP  |d DEBSZ  |d TEFOD  |d NLE  |d OCLCQ  |d ZCU  |d MERUC  |d S8J  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCA  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 476056970  |a 935246314 
020 |a 9780080478173  |q (electronic bk.) 
020 |a 0080478174  |q (electronic bk.) 
029 1 |a DEBBG  |b BV044124175 
029 1 |a DEBSZ  |b 430397380 
035 |a (OCoLC)437181461  |z (OCoLC)476056970  |z (OCoLC)935246314 
050 4 |a QA76.9.A25  |a TK5105.59 .B87 2004eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Burnett, Mark. 
245 1 0 |a Hacking the Code :  |b Auditor's Guide to Writing Secure Code for the Web. 
260 |a Burlington :  |b Syngress Pub.,  |c 2004. 
300 |a 1 online resource (473 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a 1932266658.pdf; 1932266658.pdf; Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related. 
520 |a Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |z 9781932266658 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294160  |z Texto completo 
938 |a 123Library  |b 123L  |n 34041 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL294160 
938 |a YBP Library Services  |b YANK  |n 2613265 
994 |a 92  |b IZTAP