Web security: a whitehat perspective
"Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fla. [u.a.]
Taylor & Francis, CRC Press
2015
|
Schlagworte: | |
Online-Zugang: | Cover Inhaltsverzeichnis |
Zusammenfassung: | "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"-- "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIII, 508 S. Ill., graph. Darst. |
ISBN: | 1466592613 9781466592612 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042573742 | ||
003 | DE-604 | ||
005 | 20171122 | ||
007 | t | ||
008 | 150521s2015 ad|| |||| 00||| eng d | ||
010 | |a 2014022587 | ||
020 | |a 1466592613 |c paperback |9 1-4665-9261-3 | ||
020 | |a 9781466592612 |c paperback |9 978-1-4665-9261-2 | ||
035 | |a (OCoLC)910917886 | ||
035 | |a (DE-599)GBV788175270 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-91G | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Wu, Hanqing |e Verfasser |4 aut | |
245 | 1 | 0 | |a Web security |b a whitehat perspective |c Hanqing Wu and Liz Zhao |
264 | 1 | |a Boca Raton, Fla. [u.a.] |b Taylor & Francis, CRC Press |c 2015 | |
300 | |a XXIII, 508 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 1 | |a "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"-- | |
520 | 1 | |a "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "-- | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Zhao, Liz |e Verfasser |4 aut | |
856 | 4 | |u http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg |3 Cover | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9781466592612.pdf |3 Inhaltsverzeichnis | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028007256 |
Datensatz im Suchindex
_version_ | 1804174728086159360 |
---|---|
any_adam_object | |
author | Wu, Hanqing Zhao, Liz |
author_facet | Wu, Hanqing Zhao, Liz |
author_role | aut aut |
author_sort | Wu, Hanqing |
author_variant | h w hw l z lz |
building | Verbundindex |
bvnumber | BV042573742 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)910917886 (DE-599)GBV788175270 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04023nam a2200457 c 4500</leader><controlfield tag="001">BV042573742</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171122 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150521s2015 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2014022587</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466592613</subfield><subfield code="c">paperback</subfield><subfield code="9">1-4665-9261-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466592612</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-4665-9261-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910917886</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV788175270</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Hanqing</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web security</subfield><subfield code="b">a whitehat perspective</subfield><subfield code="c">Hanqing Wu and Liz Zhao</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fla. [u.a.]</subfield><subfield code="b">Taylor & Francis, CRC Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 508 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"--</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Liz</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg</subfield><subfield code="3">Cover</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9781466592612.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028007256</subfield></datafield></record></collection> |
id | DE-604.BV042573742 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:05:00Z |
institution | BVB |
isbn | 1466592613 9781466592612 |
language | English |
lccn | 2014022587 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028007256 |
oclc_num | 910917886 |
open_access_boolean | |
owner | DE-1050 DE-91G DE-BY-TUM |
owner_facet | DE-1050 DE-91G DE-BY-TUM |
physical | XXIII, 508 S. Ill., graph. Darst. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Taylor & Francis, CRC Press |
record_format | marc |
spelling | Wu, Hanqing Verfasser aut Web security a whitehat perspective Hanqing Wu and Liz Zhao Boca Raton, Fla. [u.a.] Taylor & Francis, CRC Press 2015 XXIII, 508 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"-- "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "-- Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Internet (DE-588)4308416-3 s DE-604 Zhao, Liz Verfasser aut http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg Cover DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9781466592612.pdf Inhaltsverzeichnis |
spellingShingle | Wu, Hanqing Zhao, Liz Web security a whitehat perspective Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4274324-2 |
title | Web security a whitehat perspective |
title_auth | Web security a whitehat perspective |
title_exact_search | Web security a whitehat perspective |
title_full | Web security a whitehat perspective Hanqing Wu and Liz Zhao |
title_fullStr | Web security a whitehat perspective Hanqing Wu and Liz Zhao |
title_full_unstemmed | Web security a whitehat perspective Hanqing Wu and Liz Zhao |
title_short | Web security |
title_sort | web security a whitehat perspective |
title_sub | a whitehat perspective |
topic | Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet Computersicherheit |
url | http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg http://www.gbv.de/dms/bowker/toc/9781466592612.pdf |
work_keys_str_mv | AT wuhanqing websecurityawhitehatperspective AT zhaoliz websecurityawhitehatperspective |