Hack proofing your Web applications:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
©2001
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index. - "The only way to stop a hacker is to think like one." From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs |
Beschreibung: | 1 Online-Ressource (xxvii, 595 pages) |
ISBN: | 0080478131 1928994318 9780080478135 9781928994312 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307684 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2001 |||| o||u| ||||||eng d | ||
020 | |a 0080478131 |9 0-08-047813-1 | ||
020 | |a 1928994318 |9 1-928994-31-8 | ||
020 | |a 9780080478135 |9 978-0-08-047813-5 | ||
020 | |a 9781928994312 |9 978-1-928994-31-2 | ||
035 | |a (OCoLC)162598289 | ||
035 | |a (DE-599)BVBBV042307684 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Hack proofing your Web applications |c technical edit by Julie Traxler |
246 | 1 | 3 | |a Hackproofing your Web applications |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c ©2001 | |
300 | |a 1 Online-Ressource (xxvii, 595 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - "The only way to stop a hacker is to think like one." | ||
500 | |a From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 7 | |a Web sites / Design |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Web sites |x Design | |
700 | 1 | |a Traxler, Julie |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781928994312 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744676 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781928994312 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893294510080 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042307684 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)162598289 (DE-599)BVBBV042307684 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02639nmm a2200481zc 4500</leader><controlfield tag="001">BV042307684</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478131</subfield><subfield code="9">0-08-047813-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994318</subfield><subfield code="9">1-928994-31-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478135</subfield><subfield code="9">978-0-08-047813-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994312</subfield><subfield code="9">978-1-928994-31-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162598289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307684</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your Web applications</subfield><subfield code="c">technical edit by Julie Traxler</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hackproofing your Web applications</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 595 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - "The only way to stop a hacker is to think like one."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites / Design</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Design</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Traxler, Julie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781928994312</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744676</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781928994312</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307684 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:57Z |
institution | BVB |
isbn | 0080478131 1928994318 9780080478135 9781928994312 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744676 |
oclc_num | 162598289 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvii, 595 pages) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Hack proofing your Web applications technical edit by Julie Traxler Hackproofing your Web applications Rockland, Mass. Syngress Pub. ©2001 1 Online-Ressource (xxvii, 595 pages) txt rdacontent c rdamedia cr rdacarrier Includes index. - "The only way to stop a hacker is to think like one." From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design Traxler, Julie Sonstige oth http://www.sciencedirect.com/science/book/9781928994312 Verlag Volltext |
spellingShingle | Hack proofing your Web applications Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design |
title | Hack proofing your Web applications |
title_alt | Hackproofing your Web applications |
title_auth | Hack proofing your Web applications |
title_exact_search | Hack proofing your Web applications |
title_full | Hack proofing your Web applications technical edit by Julie Traxler |
title_fullStr | Hack proofing your Web applications technical edit by Julie Traxler |
title_full_unstemmed | Hack proofing your Web applications technical edit by Julie Traxler |
title_short | Hack proofing your Web applications |
title_sort | hack proofing your web applications |
topic | Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design |
topic_facet | Computer networks / Security measures Computer security Internet / Security measures Web sites / Design Internet Security measures Computer networks Security measures Web sites Design |
url | http://www.sciencedirect.com/science/book/9781928994312 |
work_keys_str_mv | AT traxlerjulie hackproofingyourwebapplications |