Web Application Vulnerabilities
Detect, Exploit, Prevent
(Sprache: Englisch)
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to...
Leider schon ausverkauft
versandkostenfrei
Buch (Kartoniert)
40.77 €
Produktdetails
Produktinformationen zu „Web Application Vulnerabilities “
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
.Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
.See why Cross Site Scripting attacks can be so devastating.
.Download working code from the companion Web site.
Klappentext zu „Web Application Vulnerabilities “
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications. - Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
- See why Cross Site Scripting attacks can be so devastating.
Inhaltsverzeichnis zu „Web Application Vulnerabilities “
Chapter 1: IntroductionChapter 2: Information Gathering Techniques
Chapter 3: Common Input Validation Vulnerabilities
Chapter 4: Application Logic Flaws and Common Coding Issues
Chapter 5: Common Client Trust Issues
Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment
Chapter 7: Session Management Vulnerabilities
Chapter 8: Phishing
Chapter 9: Client Side Security
Chapter 10: Same Issues / New Technologies
Chapter 11: Other Security Considerations
Autoren-Porträt von Steven Palmer
Steve has 16 years of experience in the information technology industry. Steve has worked for several very successful security boutiques as an ethical hacker. Steve has found hundreds of previously undiscovered critical vulnerabilities in a wide variety of products and applications for a wide variety of clients. Steve has performed security assessments and penetration tests for clients in many diverse industries and government agencies. He has performed security assessments for companies in many different verticals such as the entertainment, oil, energy, pharmaceutical, engineering, automotive, aerospace, insurance, computer & network security, medical, and financial & banking industries. Steve has also performed security assessments for government agencies such as the Department of Interior, Department of Treasury, Department of Justice, Department of Interior, as well as the Intelligence Community. Steve's findings have lead to the entire Department of Interior being disconnected from the Internet. Prior to being a security consultant Steve worked as a System Administrator, administering firewalls, UNIX systems, and databases for the Department of Defense, Department of Treasury, and the Department of Justice. Prior to that, Steve served 6 years in the United States Navy as an Electronics Technician. Steve has also written several security tools which have yet to be released publicly. Steve is also a member of the FBI's Infragard organization.
Bibliographische Angaben
- Autor: Steven Palmer
- 2007, 480 Seiten, Maße: 19,3 x 23,5 cm, Kartoniert (TB), Englisch
- Verlag: Syngress Media
- ISBN-10: 1597492094
- ISBN-13: 9781597492096
- Erscheinungsdatum: 27.02.2008
Sprache:
Englisch
Kommentar zu "Web Application Vulnerabilities"
0 Gebrauchte Artikel zu „Web Application Vulnerabilities“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Web Application Vulnerabilities".
Kommentar verfassen