Web application obfuscation: -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier/Syngress
c2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xiii, 275 p.) |
ISBN: | 9781597496049 1597496049 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314283 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496049 |c electronic bk. |9 978-1-59749-604-9 | ||
020 | |a 1597496049 |c electronic bk. |9 1-59749-604-9 | ||
035 | |a (OCoLC)749852776 | ||
035 | |a (DE-599)BVBBV042314283 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Heiderich, Mario |e Verfasser |4 aut | |
245 | 1 | 0 | |a Web application obfuscation |b -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- |c Mario Heiderich ... [et al.] |
264 | 1 | |a Amsterdam |b Elsevier/Syngress |c c2011 | |
300 | |a 1 Online-Ressource (xiii, 275 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Internet programming | |
650 | 4 | |a Computer security | |
650 | 4 | |a Web site development | |
650 | 4 | |a Application software |x Development | |
650 | 4 | |a Cryptography | |
653 | |a Electronic books | ||
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496049 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751274 |
Datensatz im Suchindex
_version_ | 1804152907264688128 |
---|---|
any_adam_object | |
author | Heiderich, Mario |
author_facet | Heiderich, Mario |
author_role | aut |
author_sort | Heiderich, Mario |
author_variant | m h mh |
building | Verbundindex |
bvnumber | BV042314283 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)749852776 (DE-599)BVBBV042314283 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02491nmm a2200421zc 4500</leader><controlfield tag="001">BV042314283</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496049</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-604-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496049</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-604-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)749852776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Heiderich, Mario</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web application obfuscation</subfield><subfield code="b">-/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-</subfield><subfield code="c">Mario Heiderich ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier/Syngress</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 275 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web site development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496049</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751274</subfield></datafield></record></collection> |
id | DE-604.BV042314283 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597496049 1597496049 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751274 |
oclc_num | 749852776 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xiii, 275 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier/Syngress |
record_format | marc |
spelling | Heiderich, Mario Verfasser aut Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- Mario Heiderich ... [et al.] Amsterdam Elsevier/Syngress c2011 1 Online-Ressource (xiii, 275 p.) txt rdacontent c rdamedia cr rdacarrier Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more Includes bibliographical references and index Internet programming Computer security Web site development Application software Development Cryptography Electronic books http://www.sciencedirect.com/science/book/9781597496049 Verlag Volltext |
spellingShingle | Heiderich, Mario Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- Internet programming Computer security Web site development Application software Development Cryptography |
title | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- |
title_auth | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- |
title_exact_search | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- |
title_full | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- Mario Heiderich ... [et al.] |
title_fullStr | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- Mario Heiderich ... [et al.] |
title_full_unstemmed | Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- Mario Heiderich ... [et al.] |
title_short | Web application obfuscation |
title_sort | web application obfuscation wafs evasion filters alert obfuscation |
title_sub | -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- |
topic | Internet programming Computer security Web site development Application software Development Cryptography |
topic_facet | Internet programming Computer security Web site development Application software Development Cryptography |
url | http://www.sciencedirect.com/science/book/9781597496049 |
work_keys_str_mv | AT heiderichmario webapplicationobfuscationwafsevasionfiltersalertobfuscation |