Web Hacking
Attacks and Defense
(Sprache: Englisch)
Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening...
Leider schon ausverkauft
versandkostenfrei
Buch
48.10 €
Produktdetails
Produktinformationen zu „Web Hacking “
Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java application servers; how to harden your Java Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and wormsAppendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques.Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
Klappentext zu „Web Hacking “
Intended for a course that is teaching students how and where web-based applications are particularly vulnerable. The authors explain the complete range of attacks, including buffer overflows
Inhaltsverzeichnis zu „Web Hacking “
(NOTE: Each chapter begins with an Introduction and concludes with a Summary.) Foreword. Introduction. "We're Secure, We Have a Firewall". To Err Is Human. Writing on the Wall. Book Organization. Parts. Chapters. A Final Word. Acknowledgments. Contributor. I. THE E-COMMERCE PLAYGROUND. Case Study: Acme Art, Inc. Hacked! 1. Web Languages: The Babylon of the 21st Century. Languages of the Web. HTML. Dynamic HTML (DHTML). XML. XHTML. Perl. PHP. ColdFusion. Active Server Pages. CGI. Java. 2. Web and Database Servers. Web Servers. Apache. Microsoft's Internet Information Server (IIS). Database Servers. Microsoft SQL Server. Oracle. 3. Shopping Carts and Payment Gateways. Evolution of the Storefront. Electronic Shopping. Shopping Cart Systems. Scope and Lifetime of an Electronic Shopping Cart. Collecting, Analyzing, and Comparing Selected Components. Keeping Track of the Total Cost. Change of Mind. Processing the Purchase. Implementation of a Shopping Cart Application. Product Catalog. Session Management. Database Interfacing. Integration with the Payment Gateway. Examples of Poorly Implemented Shopping Carts. Carello Shopping Cart. DCShop Shopping Cart. Hassan Consulting's Shopping Cart. Cart32 and Several Other Shopping Carts. Processing Payments. Finalizing the Order. Method of Payment. Verification and Fraud Protection. Order Fulfillment and Receipt Generation. Overview of the Payment Processing System. Innovative Ways to Combat Credit Card Fraud. Order Confirmation Page. Payment Gateway Interface. Transaction Database Interface. Interfacing with a Payment Gateway - An Example. Payment System Implementation Issues. Integration. Temporary Information. SSL. Storing User Profiles. Vulnerabilities Caused by Poor Integration of Shopping Cart and Payment Gateway. PayPal - Enabling Individuals to Accept Electronic Payments. 4. HTTP and HTTPS: The Hacking Protocols. Protocols of the Web. HTTP. HTTPS (HTTP over SSL). 5. URL: The Web Hacker's Sword. URL Structure. Web Hacker
... mehr
Psychology. URLs and Parameter Passing. URL Encoding. Meta-Characters. Specifying Special Characters on the URL String. Meta-Characters and Input Validation. Unicode Encoding. The Acme Art, Inc. Hack. Abusing URL Encoding. Unicode Encoding and Code Red's Shell Code. Unicode Vulnerability. The Double-Decode or Superfluous Decode Vulnerability. HTML Forms. Anatomy of an HTML Form. Input Elements. Parameter Passing Via GET and POST. II. URLS UNRAVELED. Case Study: Reconnaissance Leaks Corporate Assets. 6. Web: Under (the) Cover. The Components of a Web Applica
... weniger
Bibliographische Angaben
- Autoren: Saumil Shah , Shreeraj Shah
- 2002, 528 Seiten, mit Abbildungen, Maße: 18,8 x 23,2 cm, Kartoniert (TB), Englisch
- Verlag: Addison-Wesley Longman, Amsterdam
- ISBN-10: 0201761769
- ISBN-13: 9780201761764
Sprache:
Englisch
Kommentar zu "Web Hacking"
0 Gebrauchte Artikel zu „Web Hacking“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Web Hacking".
Kommentar verfassen