The basics of web hacking: tools and techniques to attack the Web
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress is an imprint of Elsevier
[2013]
|
Schlagworte: | |
Online-Zugang: | FAW01 FUBA1 UBY01 Volltext |
Beschreibung: | Includes bibliographical references and index The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more |
Beschreibung: | 1 Online-Ressource (xii, 145 Seiten) Illustrationen |
ISBN: | 9780124166592 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042314331 | ||
003 | DE-604 | ||
005 | 20231108 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124166592 |c Online |9 978-0-12-416659-2 | ||
024 | 7 | |a 10.1016/C2013-0-00087-4 |2 doi | |
035 | |a (ZDB-4-EBA)ocn852158484 | ||
035 | |a (ZDB-4-ITC)ocn852158484 | ||
035 | |a (OCoLC)852158484 | ||
035 | |a (DE-599)BVBBV042314331 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-706 |a DE-188 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Pauli, Joshua J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The basics of web hacking |b tools and techniques to attack the Web |c Josh Pauli |
264 | 1 | |a Amsterdam |b Syngress is an imprint of Elsevier |c [2013] | |
264 | 4 | |c © 2013 | |
300 | |a 1 Online-Ressource (xii, 145 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Web sites |x Security measures | |
650 | 4 | |a Web applications |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Website |0 (DE-588)4596172-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Website |0 (DE-588)4596172-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-12-416600-4 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124166004 |x Verlag |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-33-ESD |a ZDB-33-EBS |a ZDB-4-ITC | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751322 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124166004 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124166004 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2021 |x Verlag |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954 |l UBY01 |p ZDB-4-ITC |q UBY_PDA_ITC_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907359059968 |
---|---|
any_adam_object | |
author | Pauli, Joshua J. |
author_facet | Pauli, Joshua J. |
author_role | aut |
author_sort | Pauli, Joshua J. |
author_variant | j j p jj jjp |
building | Verbundindex |
bvnumber | BV042314331 |
classification_rvk | ST 277 |
collection | ZDB-4-EBA ZDB-33-ESD ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn852158484 (ZDB-4-ITC)ocn852158484 (OCoLC)852158484 (DE-599)BVBBV042314331 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03376nmm a2200721 c 4500</leader><controlfield tag="001">BV042314331</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231108 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166592</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-416659-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2013-0-00087-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn852158484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn852158484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852158484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pauli, Joshua J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The basics of web hacking</subfield><subfield code="b">tools and techniques to attack the Web</subfield><subfield code="c">Josh Pauli</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress is an imprint of Elsevier</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 145 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Website</subfield><subfield code="0">(DE-588)4596172-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Website</subfield><subfield code="0">(DE-588)4596172-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-12-416600-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124166004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751322</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124166004</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124166004</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2021</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-ITC</subfield><subfield code="q">UBY_PDA_ITC_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314331 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780124166592 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751322 |
oclc_num | 852158484 |
open_access_boolean | |
owner | DE-1046 DE-706 DE-188 |
owner_facet | DE-1046 DE-706 DE-188 |
physical | 1 Online-Ressource (xii, 145 Seiten) Illustrationen |
psigel | ZDB-4-EBA ZDB-33-ESD ZDB-33-EBS ZDB-4-ITC FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD_Kauf ZDB-33-ESD ZDB-33-ESD 2021 ZDB-4-ITC UBY_PDA_ITC_Kauf |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress is an imprint of Elsevier |
record_format | marc |
spelling | Pauli, Joshua J. Verfasser aut The basics of web hacking tools and techniques to attack the Web Josh Pauli Amsterdam Syngress is an imprint of Elsevier [2013] © 2013 1 Online-Ressource (xii, 145 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Hackers Computer crimes Prevention Website (DE-588)4596172-4 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Website (DE-588)4596172-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Rechnernetz (DE-588)4070085-9 s World Wide Web (DE-588)4363898-3 s Datensicherung (DE-588)4011144-1 s Erscheint auch als Druck-Ausgabe 978-0-12-416600-4 http://www.sciencedirect.com/science/book/9780124166004 Verlag Volltext |
spellingShingle | Pauli, Joshua J. The basics of web hacking tools and techniques to attack the Web COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Hackers Computer crimes Prevention Website (DE-588)4596172-4 gnd World Wide Web (DE-588)4363898-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4596172-4 (DE-588)4363898-3 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4011144-1 |
title | The basics of web hacking tools and techniques to attack the Web |
title_auth | The basics of web hacking tools and techniques to attack the Web |
title_exact_search | The basics of web hacking tools and techniques to attack the Web |
title_full | The basics of web hacking tools and techniques to attack the Web Josh Pauli |
title_fullStr | The basics of web hacking tools and techniques to attack the Web Josh Pauli |
title_full_unstemmed | The basics of web hacking tools and techniques to attack the Web Josh Pauli |
title_short | The basics of web hacking |
title_sort | the basics of web hacking tools and techniques to attack the web |
title_sub | tools and techniques to attack the Web |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Hackers Computer crimes Prevention Website (DE-588)4596172-4 gnd World Wide Web (DE-588)4363898-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Hackers Computer crimes Prevention Website World Wide Web Rechnernetz Computersicherheit Datensicherung |
url | http://www.sciencedirect.com/science/book/9780124166004 |
work_keys_str_mv | AT paulijoshuaj thebasicsofwebhackingtoolsandtechniquestoattacktheweb |