Description |
1 online resource (xxii, 489 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
|
data file |
Note |
Includes index. |
|
Print version record. |
Contents |
Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. |
Summary |
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. |
Language |
English. |
Subject |
Computer networks -- Security measures.
|
|
Web sites -- Security measures.
|
|
Computer security.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures.
|
|
Sites Web -- Sécurité -- Mesures.
|
|
Sécurité informatique.
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Web sites -- Security measures
|
Other Form: |
Print version: Cross, Michael, 1965- Developer's guide to web application security. Rockland, MA : Syngress Pub., ©2007 159749061X 9781597490610 (OCoLC)82366027 |
ISBN |
9781429456470 (electronic bk.) |
|
1429456477 (electronic bk.) |
|
9781597490610 |
|
159749061X |
|
0080504094 |
|
9780080504094 |
|
1281060216 |
|
9781281060211 |
|
9786611060213 |
|
6611060219 |
Standard No. |
792502090619 |
|
AU@ 000048752500 |
|
AU@ 000051860804 |
|
AU@ 000053246597 |
|
AU@ 000053250696 |
|
CHNEW 001004980 |
|
DEBBG BV042031491 |
|
DEBBG BV042314146 |
|
DEBBG BV043142148 |
|
DEBBG BV044123238 |
|
DEBSZ 275161625 |
|
DEBSZ 414169441 |
|
DEBSZ 422226041 |
|
DEBSZ 430383738 |
|
GBVCP 560399375 |
|
NZ1 11777839 |
|
NZ1 12048942 |
|
NZ1 15177152 |
|
DKDLA 820120-katalog:999914705505765 |
|