Hack proofing ColdFusion:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2002
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at solutions@syngress.com |
Beschreibung: | 1 Online-Ressource (xxiv, 515 p.) |
ISBN: | 1928994776 1932266224 9781928994770 9781932266221 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043084146 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2002 |||| o||u| ||||||eng d | ||
020 | |a 1928994776 |9 1-928994-77-6 | ||
020 | |a 1932266224 |c electronic bk. |9 1-932266-22-4 | ||
020 | |a 9781928994770 |9 978-1-928994-77-0 | ||
020 | |a 9781932266221 |c electronic bk. |9 978-1-932266-22-1 | ||
035 | |a (OCoLC)51563683 | ||
035 | |a (DE-599)BVBBV043084146 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
245 | 1 | 0 | |a Hack proofing ColdFusion |c Greg Meyer ... [et al.] ; Steven Casco, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c c2002 | |
300 | |a 1 Online-Ressource (xxiv, 515 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at solutions@syngress.com | ||
630 | 0 | 4 | |a ColdFusion |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a ColdFusion |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Meyer, Greg |e Sonstige |4 oth | |
700 | 1 | |a Casco, Steven |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028508338 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175478760669184 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043084146 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)51563683 (DE-599)BVBBV043084146 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03429nmm a2200493zc 4500</leader><controlfield tag="001">BV043084146</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994776</subfield><subfield code="9">1-928994-77-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266224</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-22-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994770</subfield><subfield code="9">978-1-928994-77-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266221</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-22-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563683</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043084146</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing ColdFusion</subfield><subfield code="c">Greg Meyer ... [et al.] ; Steven Casco, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 515 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at solutions@syngress.com</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">ColdFusion</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">ColdFusion</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meyer, Greg</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casco, Steven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028508338</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043084146 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:56Z |
institution | BVB |
isbn | 1928994776 1932266224 9781928994770 9781932266221 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028508338 |
oclc_num | 51563683 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiv, 515 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress |
record_format | marc |
spelling | Hack proofing ColdFusion Greg Meyer ... [et al.] ; Steven Casco, technical editor Rockland, MA Syngress c2002 1 Online-Ressource (xxiv, 515 p.) txt rdacontent c rdamedia cr rdacarrier Includes index The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at solutions@syngress.com ColdFusion COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh ColdFusion fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Meyer, Greg Sonstige oth Casco, Steven Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909 Aggregator Volltext |
spellingShingle | Hack proofing ColdFusion ColdFusion COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh ColdFusion fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Hack proofing ColdFusion |
title_auth | Hack proofing ColdFusion |
title_exact_search | Hack proofing ColdFusion |
title_full | Hack proofing ColdFusion Greg Meyer ... [et al.] ; Steven Casco, technical editor |
title_fullStr | Hack proofing ColdFusion Greg Meyer ... [et al.] ; Steven Casco, technical editor |
title_full_unstemmed | Hack proofing ColdFusion Greg Meyer ... [et al.] ; Steven Casco, technical editor |
title_short | Hack proofing ColdFusion |
title_sort | hack proofing coldfusion |
topic | ColdFusion COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh ColdFusion fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | ColdFusion COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75909 |
work_keys_str_mv | AT meyergreg hackproofingcoldfusion AT cascosteven hackproofingcoldfusion |