Web security testing cookbook: systematic techniques to find problems fast
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2008
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIII, 285 S. |
ISBN: | 9780596514839 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023474704 | ||
003 | DE-604 | ||
005 | 20100413 | ||
007 | t | ||
008 | 080804s2008 |||| 00||| eng d | ||
020 | |a 9780596514839 |c pbk |9 978-0-596-51483-9 | ||
035 | |a (OCoLC)474607888 | ||
035 | |a (DE-599)GBV567044661 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-473 |a DE-92 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Hope, Paco |e Verfasser |4 aut | |
245 | 1 | 0 | |a Web security testing cookbook |b systematic techniques to find problems fast |c Paco Hope and Ben Walther |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2008 | |
300 | |a XXIII, 285 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Edb-sikkerhed | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Walther, Ben |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016656974&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016656974 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137898119790592 |
---|---|
adam_text | Table
of
Contents
Foreword
.................................................................. xiii
Preface
.....................................................................xv
1.
Introduction
............................................................ 1
1.1
What Is Security Testing?
1
1.2
What Are Web Applications?
5
1.3
Web Application Fundamentals
9
1.4
Web App Security Testing
14
1.5
It s About the How
14
2.
Installino Some
Free Tools
..........................................
17
2.1
Installing Firefox
17
2.2
Installing Firefox Extensions
18
2.3
Installing Firebug
19
2.4
Installing OWASP s WebScarab
20
2.5
Installing Perl and Packages on Windows
21
2.6
Installing Perl and Using CPAN on Linux, Unix, or OS X
22
2.7
Installing CAL9000
22
2.8
Installing the ViewState Decoder
23
2.9
Installing cURL
24
2.10
Installing Pornzilla
24
2.11
Installing Cygwin
25
2.12
Installing
Nikto
2
27
2.13
Installing Burp Suite
28
2.14
Installing Apache HTTP Server
28
3.
Basic Observation
..................................................
31
3.1
Viewing a Page s HTML Source
32
3.2
Viewing the Source, Advanced
33
3.3
Observing Live Request Headers with Firebug
36
3.4
Observing Live Post Data with WebScarab
40
VII
3.5
Seeing Hidden Form Fields
43
3.6
Observing Live Response Headers with TamperData
44
3.7
Highlighting JavaScript and Comments
47
3.8
Detecting JavaScript Events
48
3.9
Modifying Specific Element Attributes
49
3.10
Track Element Attributes Dynamically
51
3.11
Conclusion
53
4.
Web-Oriented Data Encoding
.............................................55
4.1
Recognizing Binary Data Representations
56
4.2
Working with Base
64 58
4.3
Converting Base-36 Numbers in a Web Page
60
4.4
Working with Base
36
in Perl
60
4.5
Working with URL-Encoded Data
61
4.6
Working with HTML Entity Data
63
4.7
Calculating Hashes
65
4.8
Recognizing Time Formats
67
4.9
Encoding Time Values Programmatically
68
4.10
Decoding ASP.NET s ViewState
70
4.11
Decoding Multiple Encodings
71
5.
Tampering with Input
...................................................73
5.1
Intercepting and Modifying POST Requests
74
5.2
Bypassing Input Limits
77
5.3
Tampering with the URL
78
5.4
Automating URL Tampering
80
5.5
Testing URL-Length Handling
81
5.6
Editing Cookies
84
5.7
Falsifying Browser Header Information
86
5.8
Uploading Files with Malicious Names
88
5.9
Uploading Large Files
91
5.10
Uploading Malicious XML Entity Files
92
5.11
Uploading Malicious XML Structure
94
5.12
Uploading Malicious ZIP Files
96
5.13
Uploading Sample Virus Files
96
5.14
Bypassing User-Interface Restrictions
98
6.
Automated Bulk Scanning
.............................................. 101
6.1
Spidering a Website with WebScarab
102
6.2
Turning Spider Results into an Inventory
104
6.3
Reducing the URLs to Test
107
6.4
Using a Spreadsheet to Pare Down the List
107
6.5
Mirroring a Website with LWP
108
viii
I Table of Contents
6.6
Mirroring
a
Website
with wget
110
6.7
Mirroring a Specific Inventory with wget 111
6.8
Scanning a Website with
Nikto
112
6.9
Interpretting Nikto s Results
114
6.10
Scan an HTTPS Site with
Nikto
115
6.11
Using
Nikto
with Authentication
116
6.12
Start
Nikto
at a Specific Starting Point
117
6.13
Using a Specific Session Cookie with
Nikto
118
6.14
Testing Web Services with WSFuzzer
119
6.15
Interpreting WSFuzzer s Results
121
7.
Automating Specific Tasks with cURL
..................................... 125
7.1
Fetching a Page with cURL
126
7.2
Fetching Many Variations on a URL
127
7.3
Following Redirects Automatically
128
7.4
Checking for Cross-Site Scripting with cURL
128
7.5
Checking for Directory Traversal with cURL
132
7.6
Impersonating a Specific Kind of Web Browser or Device
135
7.7
Interactively Impersonating Another Device
136
7.8
Imitating a Search Engine with cURL
139
7.9
Faking Workflow by Forging
Référer
Headers
140
7.10
Fetching Only the HTTP Headers
141
7.11
POSTing with cURL
142
7.12
Maintaining Session State
144
7.13
Manipulating Cookies
145
7.14
Uploading a File with cURL
146
7.15
Building a Multistage Test Case
147
7.16
Conclusion
152
8.
Automating with LibWWWPerl
.......................................... 153
8.1
Writing a Basic Perl Script to Fetch a Page
154
8.2
Programmatically Changing Parameters
156
8.3
Simulating Form Input with POST
157
8.4
Capturing and Storing Cookies
158
8.5
Checking Session Expiration
159
8.6
Testing Session Fixation
162
8.7
Sending Malicious Cookie Values
164
8.8
Uploading Malicious File Contents
166
8.9
Uploading Files with Malicious Names
167
8.10
Uploading Viruses to Applications
169
8.11
Parsing for a Received Value with Perl
171
8.12
Editing a Page Programmatically
172
8.13
Using Threading for Performance
175
Table of Contents I
ix
9.
Seeking Design Flaws
.................................................. 177
9.1
Bypassing Required Navigation
178
9.2
Attempting Privileged Operations
180
9.3
Abusing Password Recovery
181
9.4
Abusing Predictable Identifiers
183
9.5
Predicting Credentials
184
9.6
Finding Random Numbers in Your Application
186
9.7
Testing Random Numbers
188
9.8
Abusing Repeatability
190
9.9
Abusing High-Load Actions
192
9.10
Abusing Restrictive Functionality
194
9.11
Abusing Race Conditions
195
10.
Attacking
AJAX........................................................197
10.1
Observing Live
AJAX
Requests
199
10.2
Identifying JavaScript in Applications
200
10.3
Tracing
AJAX
Activity Back to Its Source
201
10.4
Intercepting and Modifying
AJAX
Requests
202
10.5
Intercepting and Modifying Server Responses
204
10.6
Subverting
AJAX
with Injected Data
206
10.7
Subverting
AJAX
with Injected XML
208
10.8
Subverting
AJAX
with Injected JSON
209
10.9
Disrupting Client State
211
10.10
Checking for Cross-Domain Access
212
10.11
Reading Private Data via JSON Hijacking
213
11.
Manipulating Sessions
................................................. 215
11.1
Finding Session Identifiers in Cookies
216
11.2
Finding Session Identifiers in Requests
218
11.3
Finding Authorization Headers
219
11.4
Analyzing Session ID Expiration
221
11.5
Analyzing Session Identifiers with Burp
225
11.6
Analyzing Session Randomness with WebScarab
227
11.7
Changing Sessions to Evade Restrictions
232
11.8
Impersonating Another User
233
11.9
Fixing Sessions
234
11.10
Testing for Cross-Site Request Forgery
235
12.
Multifaceted Tests
.....................................................237
12.1
Stealing Cookies Using XSS
237
12.2
Creating Overlays Using XSS
239
12.3
Making HTTP Requests Using XSS
240
12.4
Attempting DOM-Based XSS Interactively
242
Table of Contents
12.5
Bypassing Field Length Restrictions (XSS)
244
12.6
Attempting Cross-Site Tracing Interactively
245
12.7
Modifying Host Headers
247
12.8
Brute-Force Guessing Usernames and Passwords
248
12.9
Attempting PHP Include File Injection Interactively
251
12.10
Creating Decompression Bombs
252
12.11
Attempting Command Injection Interactively
254
12.12
Attempting Command Injection Systematically
256
12.13
Attempting XPath Injection Interactively
258
12.14
Attempting Server-Side Includes (SSI) Injection Interactively
261
12.15
Attempting Server-Side Includes (SSI) Injection Systematically
262
12.16
Attempting
LDAP
Injection Interactively
264
12.17
Attempting Log Injection Interactively
266
Index
.....................................................................269
Table of Contents I
xi
|
adam_txt |
Table
of
Contents
Foreword
. xiii
Preface
.xv
1.
Introduction
. 1
1.1
What Is Security Testing?
1
1.2
What Are Web Applications?
5
1.3
Web Application Fundamentals
9
1.4
Web App Security Testing
14
1.5
It's About the How
14
2.
Installino Some
Free Tools
.
17
2.1
Installing Firefox
17
2.2
Installing Firefox Extensions
18
2.3
Installing Firebug
19
2.4
Installing OWASP's WebScarab
20
2.5
Installing Perl and Packages on Windows
21
2.6
Installing Perl and Using CPAN on Linux, Unix, or OS X
22
2.7
Installing CAL9000
22
2.8
Installing the ViewState Decoder
23
2.9
Installing cURL
24
2.10
Installing Pornzilla
24
2.11
Installing Cygwin
25
2.12
Installing
Nikto
2
27
2.13
Installing Burp Suite
28
2.14
Installing Apache HTTP Server
28
3.
Basic Observation
.
31
3.1
Viewing a Page's HTML Source
32
3.2
Viewing the Source, Advanced
33
3.3
Observing Live Request Headers with Firebug
36
3.4
Observing Live Post Data with WebScarab
40
VII
3.5
Seeing Hidden Form Fields
43
3.6
Observing Live Response Headers with TamperData
44
3.7
Highlighting JavaScript and Comments
47
3.8
Detecting JavaScript Events
48
3.9
Modifying Specific Element Attributes
49
3.10
Track Element Attributes Dynamically
51
3.11
Conclusion
53
4.
Web-Oriented Data Encoding
.55
4.1
Recognizing Binary Data Representations
56
4.2
Working with Base
64 58
4.3
Converting Base-36 Numbers in a Web Page
60
4.4
Working with Base
36
in Perl
60
4.5
Working with URL-Encoded Data
61
4.6
Working with HTML Entity Data
63
4.7
Calculating Hashes
65
4.8
Recognizing Time Formats
67
4.9
Encoding Time Values Programmatically
68
4.10
Decoding ASP.NET's ViewState
70
4.11
Decoding Multiple Encodings
71
5.
Tampering with Input
.73
5.1
Intercepting and Modifying POST Requests
74
5.2
Bypassing Input Limits
77
5.3
Tampering with the URL
78
5.4
Automating URL Tampering
80
5.5
Testing URL-Length Handling
81
5.6
Editing Cookies
84
5.7
Falsifying Browser Header Information
86
5.8
Uploading Files with Malicious Names
88
5.9
Uploading Large Files
91
5.10
Uploading Malicious XML Entity Files
92
5.11
Uploading Malicious XML Structure
94
5.12
Uploading Malicious ZIP Files
96
5.13
Uploading Sample Virus Files
96
5.14
Bypassing User-Interface Restrictions
98
6.
Automated Bulk Scanning
. 101
6.1
Spidering a Website with WebScarab
102
6.2
Turning Spider Results into an Inventory
104
6.3
Reducing the URLs to Test
107
6.4
Using a Spreadsheet to Pare Down the List
107
6.5
Mirroring a Website with LWP
108
viii
I Table of Contents
6.6
Mirroring
a
Website
with wget
110
6.7
Mirroring a Specific Inventory with wget 111
6.8
Scanning a Website with
Nikto
112
6.9
Interpretting Nikto's Results
114
6.10
Scan an HTTPS Site with
Nikto
115
6.11
Using
Nikto
with Authentication
116
6.12
Start
Nikto
at a Specific Starting Point
117
6.13
Using a Specific Session Cookie with
Nikto
118
6.14
Testing Web Services with WSFuzzer
119
6.15
Interpreting WSFuzzer's Results
121
7.
Automating Specific Tasks with cURL
. 125
7.1
Fetching a Page with cURL
126
7.2
Fetching Many Variations on a URL
127
7.3
Following Redirects Automatically
128
7.4
Checking for Cross-Site Scripting with cURL
128
7.5
Checking for Directory Traversal with cURL
132
7.6
Impersonating a Specific Kind of Web Browser or Device
135
7.7
Interactively Impersonating Another Device
136
7.8
Imitating a Search Engine with cURL
139
7.9
Faking Workflow by Forging
Référer
Headers
140
7.10
Fetching Only the HTTP Headers
141
7.11
POSTing with cURL
142
7.12
Maintaining Session State
144
7.13
Manipulating Cookies
145
7.14
Uploading a File with cURL
146
7.15
Building a Multistage Test Case
147
7.16
Conclusion
152
8.
Automating with LibWWWPerl
. 153
8.1
Writing a Basic Perl Script to Fetch a Page
154
8.2
Programmatically Changing Parameters
156
8.3
Simulating Form Input with POST
157
8.4
Capturing and Storing Cookies
158
8.5
Checking Session Expiration
159
8.6
Testing Session Fixation
162
8.7
Sending Malicious Cookie Values
164
8.8
Uploading Malicious File Contents
166
8.9
Uploading Files with Malicious Names
167
8.10
Uploading Viruses to Applications
169
8.11
Parsing for a Received Value with Perl
171
8.12
Editing a Page Programmatically
172
8.13
Using Threading for Performance
175
Table of Contents I
ix
9.
Seeking Design Flaws
. 177
9.1
Bypassing Required Navigation
178
9.2
Attempting Privileged Operations
180
9.3
Abusing Password Recovery
181
9.4
Abusing Predictable Identifiers
183
9.5
Predicting Credentials
184
9.6
Finding Random Numbers in Your Application
186
9.7
Testing Random Numbers
188
9.8
Abusing Repeatability
190
9.9
Abusing High-Load Actions
192
9.10
Abusing Restrictive Functionality
194
9.11
Abusing Race Conditions
195
10.
Attacking
AJAX.197
10.1
Observing Live
AJAX
Requests
199
10.2
Identifying JavaScript in Applications
200
10.3
Tracing
AJAX
Activity Back to Its Source
201
10.4
Intercepting and Modifying
AJAX
Requests
202
10.5
Intercepting and Modifying Server Responses
204
10.6
Subverting
AJAX
with Injected Data
206
10.7
Subverting
AJAX
with Injected XML
208
10.8
Subverting
AJAX
with Injected JSON
209
10.9
Disrupting Client State
211
10.10
Checking for Cross-Domain Access
212
10.11
Reading Private Data via JSON Hijacking
213
11.
Manipulating Sessions
. 215
11.1
Finding Session Identifiers in Cookies
216
11.2
Finding Session Identifiers in Requests
218
11.3
Finding Authorization Headers
219
11.4
Analyzing Session ID Expiration
221
11.5
Analyzing Session Identifiers with Burp
225
11.6
Analyzing Session Randomness with WebScarab
227
11.7
Changing Sessions to Evade Restrictions
232
11.8
Impersonating Another User
233
11.9
Fixing Sessions
234
11.10
Testing for Cross-Site Request Forgery
235
12.
Multifaceted Tests
.237
12.1
Stealing Cookies Using XSS
237
12.2
Creating Overlays Using XSS
239
12.3
Making HTTP Requests Using XSS
240
12.4
Attempting DOM-Based XSS Interactively
242
Table of Contents
12.5
Bypassing Field Length Restrictions (XSS)
244
12.6
Attempting Cross-Site Tracing Interactively
245
12.7
Modifying Host Headers
247
12.8
Brute-Force Guessing Usernames and Passwords
248
12.9
Attempting PHP Include File Injection Interactively
251
12.10
Creating Decompression Bombs
252
12.11
Attempting Command Injection Interactively
254
12.12
Attempting Command Injection Systematically
256
12.13
Attempting XPath Injection Interactively
258
12.14
Attempting Server-Side Includes (SSI) Injection Interactively
261
12.15
Attempting Server-Side Includes (SSI) Injection Systematically
262
12.16
Attempting
LDAP
Injection Interactively
264
12.17
Attempting Log Injection Interactively
266
Index
.269
Table of Contents I
xi |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Hope, Paco |
author_facet | Hope, Paco |
author_role | aut |
author_sort | Hope, Paco |
author_variant | p h ph |
building | Verbundindex |
bvnumber | BV023474704 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)474607888 (DE-599)GBV567044661 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01827nam a2200457 c 4500</leader><controlfield tag="001">BV023474704</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100413 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080804s2008 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596514839</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-596-51483-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)474607888</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV567044661</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hope, Paco</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web security testing cookbook</subfield><subfield code="b">systematic techniques to find problems fast</subfield><subfield code="c">Paco Hope and Ben Walther</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 285 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Edb-sikkerhed</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walther, Ben</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016656974&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016656974</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV023474704 |
illustrated | Not Illustrated |
index_date | 2024-07-02T21:35:44Z |
indexdate | 2024-07-09T21:19:36Z |
institution | BVB |
isbn | 9780596514839 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016656974 |
oclc_num | 474607888 |
open_access_boolean | |
owner | DE-703 DE-473 DE-BY-UBG DE-92 |
owner_facet | DE-703 DE-473 DE-BY-UBG DE-92 |
physical | XXIII, 285 S. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | O'Reilly |
record_format | marc |
spelling | Hope, Paco Verfasser aut Web security testing cookbook systematic techniques to find problems fast Paco Hope and Ben Walther 1. ed. Beijing [u.a.] O'Reilly 2008 XXIII, 285 S. txt rdacontent n rdamedia nc rdacarrier Edb-sikkerhed Computersicherheit (DE-588)4274324-2 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf World Wide Web (DE-588)4363898-3 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Rechnernetz (DE-588)4070085-9 s 1\p DE-604 Walther, Ben Sonstige oth Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016656974&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hope, Paco Web security testing cookbook systematic techniques to find problems fast Edb-sikkerhed Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4363898-3 (DE-588)4011144-1 (DE-588)4070085-9 |
title | Web security testing cookbook systematic techniques to find problems fast |
title_auth | Web security testing cookbook systematic techniques to find problems fast |
title_exact_search | Web security testing cookbook systematic techniques to find problems fast |
title_exact_search_txtP | Web security testing cookbook systematic techniques to find problems fast |
title_full | Web security testing cookbook systematic techniques to find problems fast Paco Hope and Ben Walther |
title_fullStr | Web security testing cookbook systematic techniques to find problems fast Paco Hope and Ben Walther |
title_full_unstemmed | Web security testing cookbook systematic techniques to find problems fast Paco Hope and Ben Walther |
title_short | Web security testing cookbook |
title_sort | web security testing cookbook systematic techniques to find problems fast |
title_sub | systematic techniques to find problems fast |
topic | Edb-sikkerhed Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Edb-sikkerhed Computersicherheit World Wide Web Datensicherung Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016656974&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hopepaco websecuritytestingcookbooksystematictechniquestofindproblemsfast AT waltherben websecuritytestingcookbooksystematictechniquestofindproblemsfast |