Web application vulnerabilities: detect, exploit, prevent
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket |
Beschreibung: | 1 Online-Ressource (1 v.) |
ISBN: | 0080556647 1597492094 9780080556642 9781597492096 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043099549 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080556647 |c electronic bk. |9 0-08-055664-7 | ||
020 | |a 1597492094 |9 1-59749-209-4 | ||
020 | |a 9780080556642 |c electronic bk. |9 978-0-08-055664-2 | ||
020 | |a 9781597492096 |9 978-1-59749-209-6 | ||
035 | |a (OCoLC)298103826 | ||
035 | |a (DE-599)BVBBV043099549 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Web application vulnerabilities |b detect, exploit, prevent |c Michael Cross ... [et al.] |
264 | 1 | |a Burlington, Mass. |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (1 v.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services | ||
500 | |a "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Application software |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 1 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Cross, Michael |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028523740 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175508114505728 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043099549 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)298103826 (DE-599)BVBBV043099549 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03261nmm a2200565zc 4500</leader><controlfield tag="001">BV043099549</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556647</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055664-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492094</subfield><subfield code="9">1-59749-209-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556642</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055664-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492096</subfield><subfield code="9">978-1-59749-209-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298103826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043099549</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web application vulnerabilities</subfield><subfield code="b">detect, exploit, prevent</subfield><subfield code="c">Michael Cross ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 v.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028523740</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043099549 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:24Z |
institution | BVB |
isbn | 0080556647 1597492094 9780080556642 9781597492096 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028523740 |
oclc_num | 298103826 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (1 v.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Web application vulnerabilities detect, exploit, prevent Michael Cross ... [et al.] Burlington, Mass. Syngress Pub. c2007 1 Online-Ressource (1 v.) txt rdacontent c rdamedia cr rdacarrier Includes index Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer security Datensicherung (DE-588)4011144-1 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf World Wide Web (DE-588)4363898-3 s Anwendungssoftware (DE-588)4120906-0 s Softwareentwicklung (DE-588)4116522-6 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Cross, Michael Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Web application vulnerabilities detect, exploit, prevent COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer security Datensicherung (DE-588)4011144-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Anwendungssoftware (DE-588)4120906-0 gnd World Wide Web (DE-588)4363898-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4116522-6 (DE-588)4120906-0 (DE-588)4363898-3 |
title | Web application vulnerabilities detect, exploit, prevent |
title_auth | Web application vulnerabilities detect, exploit, prevent |
title_exact_search | Web application vulnerabilities detect, exploit, prevent |
title_full | Web application vulnerabilities detect, exploit, prevent Michael Cross ... [et al.] |
title_fullStr | Web application vulnerabilities detect, exploit, prevent Michael Cross ... [et al.] |
title_full_unstemmed | Web application vulnerabilities detect, exploit, prevent Michael Cross ... [et al.] |
title_short | Web application vulnerabilities |
title_sort | web application vulnerabilities detect exploit prevent |
title_sub | detect, exploit, prevent |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer security Datensicherung (DE-588)4011144-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Anwendungssoftware (DE-588)4120906-0 gnd World Wide Web (DE-588)4363898-3 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Application software Security measures Computer security Datensicherung Softwareentwicklung Anwendungssoftware World Wide Web |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214750 |
work_keys_str_mv | AT crossmichael webapplicationvulnerabilitiesdetectexploitprevent |