PARA TODA NECESIDAD SIEMPRE HAY UN LIBRO

Imagen de Google Jackets

The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto

Por: Colaborador(es): Tipo de material: TextoTextoDetalles de publicación: Indianapolis, IN : Wiley ; ©2011Edición: 2a ediciónDescripción: xxxiii, 878 páginas : ilustraciones ; 24 x 19 centímetrosTipo de contenido:
  • texto
Tipo de medio:
  • sin medio
Tipo de soporte:
  • volumen
ISBN:
  • 9781118026472 (pbk.)
Tema(s): Clasificación LoC:
  • TK 5105 .875 .I57 S93 2011
Contenidos:
Web application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.
Resumen: " Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. " -- P. Web Editorial
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Biblioteca de origen Colección Signatura topográfica Copia número Estado Notas Fecha de vencimiento Código de barras Reserva de ítems
Libros para consulta en sala Libros para consulta en sala Biblioteca Antonio Enriquez Savignac Biblioteca Antonio Enriquez Savignac COLECCIÓN RESERVA TK 5105 .875 .I57 S93 2011 (Navegar estantería(Abre debajo)) 1 No para préstamo Ing. Telematica 036647
Libros Libros Biblioteca Antonio Enriquez Savignac Biblioteca Antonio Enriquez Savignac Colección General TK 5105 .875 .I57 S93 2011 (Navegar estantería(Abre debajo)) 2 Disponible Ing. Telematica 036648
Total de reservas: 0

Incluye índice

Web application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.

" Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. " -- P. Web Editorial

PIT

NUEVOSTELEMAT

  • Universidad del Caribe
  • Con tecnología Koha