Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Elsevier Science
2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include Hacking Web Apps; Copyright; About the Author; Acknowledgements; Table of Contents; Introduction; 1 HTML5; The New Document Object Model (DOM); Cross-Origin Resource Sharing (CORS); WebSockets; Transferring Data; Data Frames; Security Considerations; Web Storage; IndexedDB; Web Workers; Flotsam & Jetsam; History API; Draft APIs; Summary; 2 HTML Injection & Cross-Site Scripting (XSS); Understanding HTML Injection; Identifying Points of Injection; URI Components; Form Fields; HTTP Request Headers & Cookies; JavaScript Object Notation (JSON); Document Object Model (DOM) Properties Cascading Style Sheets (CSS)User-Generated Content; Identifying the Type of Reflection; Ephemeral; Persistent; Out of Band; Identifying the Injection's Rendered Context; Element Attributes; Elements & Text Nodes; JavaScript Variables; Syntax Delimiters; Putting the Hack Together; Abusing Character Sets; Attack Camouflage with Percent Encoding; Encoding 0X00-Nothing Really Matters; Alternate Encodings for the Same Character; Why Encoding Matters for HTML Injection; Exploiting Failure Modes; Bypassing Weak Exclusion Lists; Leveraging Browser Quirks; The Unusual Suspects; Subverting MIME Types Surprising MIME TypesSVG Markup; The Impact of XSS; Data Redirection; Employing Countermeasures; Fixing a Static Character Set; Normalizing Character Sets and Encoding; Encoding the Output; Beware of Exclusion Lists and Regexes; Reuse, Don't Reimplement, Code; JavaScript Sandboxes; HTML5 Sandboxes; Browsers' Built-In XSS Defenses; Summary; 3 Cross-Site Request Forgery (CSRF); Understanding Cross-Site Request Forgery; The Mechanics of CSRF; Request Forgery via Forced Browsing; POST Forgery; The Madness of Methods; Attacking Authenticated Actions without Passwords Dangerous Liaison: CSRF and HTML InjectionBe Wary of the Tangled Web; Variation on a Theme: Clickjacking; Employing Countermeasures; Heading in the Right Direction; A Dependable Origin; An Unreliable Referer1; Custom Headers: X-Marks-the-Spot; Shared Secrets; Mirror the Cookie; Require Manual Confirmation; Understanding Same Origin Policy; Anti-Framing via JavaScript; Framing the Solution; Defending the Web Browser; Vulnerability & Verisimilitude; Summary; 4 SQL Injection & Data Store Manipulation; Understanding SQL Injection; Hacking Tangents: Mathematical and Grammatical Breaking SQL StatementsBreaking Naive Defenses; Exploiting Errors; Inference; Data Truncation; Vivisecting the Database; Extracting Information with Stacked Queries; Controlling the Database & Operating System; Alternate Attack Vectors; Real-World SQL Injection; HTML5's Web Storage API; SQL Injection Without SQL; Employing Countermeasures; Validating Input; Securing the Statement; Parameterized Queries; Stored Procedures; NET Language-Integrated Query (LINQ); Protecting Information; Encrypting Data; Segregating Data; Stay Current with Database Patches; Summary |
Beschreibung: | 297 pages |
ISBN: | 9781597499569 1597499560 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043960077 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161213s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597499569 |9 978-1-59749-956-9 | ||
020 | |a 1597499560 |9 1-59749-956-0 | ||
035 | |a (ZDB-4-EBA)ocn811491532 | ||
035 | |a (ZDB-4-ITC)ocn811491532 | ||
035 | |a (OCoLC)811491532 | ||
035 | |a (DE-599)BVBBV043960077 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1047 |a DE-1046 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Shema, Mike |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking Web Apps |b Detecting and Preventing Web Application Security Problems |
264 | 1 | |a Rockland, MA |b Elsevier Science |c 2012 | |
300 | |a 297 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include | ||
500 | |a Hacking Web Apps; Copyright; About the Author; Acknowledgements; Table of Contents; Introduction; 1 HTML5; The New Document Object Model (DOM); Cross-Origin Resource Sharing (CORS); WebSockets; Transferring Data; Data Frames; Security Considerations; Web Storage; IndexedDB; Web Workers; Flotsam & Jetsam; History API; Draft APIs; Summary; 2 HTML Injection & Cross-Site Scripting (XSS); Understanding HTML Injection; Identifying Points of Injection; URI Components; Form Fields; HTTP Request Headers & Cookies; JavaScript Object Notation (JSON); Document Object Model (DOM) Properties | ||
500 | |a Cascading Style Sheets (CSS)User-Generated Content; Identifying the Type of Reflection; Ephemeral; Persistent; Out of Band; Identifying the Injection's Rendered Context; Element Attributes; Elements & Text Nodes; JavaScript Variables; Syntax Delimiters; Putting the Hack Together; Abusing Character Sets; Attack Camouflage with Percent Encoding; Encoding 0X00-Nothing Really Matters; Alternate Encodings for the Same Character; Why Encoding Matters for HTML Injection; Exploiting Failure Modes; Bypassing Weak Exclusion Lists; Leveraging Browser Quirks; The Unusual Suspects; Subverting MIME Types | ||
500 | |a Surprising MIME TypesSVG Markup; The Impact of XSS; Data Redirection; Employing Countermeasures; Fixing a Static Character Set; Normalizing Character Sets and Encoding; Encoding the Output; Beware of Exclusion Lists and Regexes; Reuse, Don't Reimplement, Code; JavaScript Sandboxes; HTML5 Sandboxes; Browsers' Built-In XSS Defenses; Summary; 3 Cross-Site Request Forgery (CSRF); Understanding Cross-Site Request Forgery; The Mechanics of CSRF; Request Forgery via Forced Browsing; POST Forgery; The Madness of Methods; Attacking Authenticated Actions without Passwords | ||
500 | |a Dangerous Liaison: CSRF and HTML InjectionBe Wary of the Tangled Web; Variation on a Theme: Clickjacking; Employing Countermeasures; Heading in the Right Direction; A Dependable Origin; An Unreliable Referer1; Custom Headers: X-Marks-the-Spot; Shared Secrets; Mirror the Cookie; Require Manual Confirmation; Understanding Same Origin Policy; Anti-Framing via JavaScript; Framing the Solution; Defending the Web Browser; Vulnerability & Verisimilitude; Summary; 4 SQL Injection & Data Store Manipulation; Understanding SQL Injection; Hacking Tangents: Mathematical and Grammatical | ||
500 | |a Breaking SQL StatementsBreaking Naive Defenses; Exploiting Errors; Inference; Data Truncation; Vivisecting the Database; Extracting Information with Stacked Queries; Controlling the Database & Operating System; Alternate Attack Vectors; Real-World SQL Injection; HTML5's Web Storage API; SQL Injection Without SQL; Employing Countermeasures; Validating Input; Securing the Statement; Parameterized Queries; Stored Procedures; NET Language-Integrated Query (LINQ); Protecting Information; Encrypting Data; Segregating Data; Stay Current with Database Patches; Summary | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Web sites / Security measures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Application software |x Security measures | |
650 | 4 | |a Computer programs |x Security measures | |
650 | 4 | |a Web site development |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Computer security | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029368781 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176916578566144 |
---|---|
any_adam_object | |
author | Shema, Mike |
author_facet | Shema, Mike |
author_role | aut |
author_sort | Shema, Mike |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV043960077 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn811491532 (ZDB-4-ITC)ocn811491532 (OCoLC)811491532 (DE-599)BVBBV043960077 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05365nmm a2200541zc 4500</leader><controlfield tag="001">BV043960077</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161213s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499569</subfield><subfield code="9">978-1-59749-956-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499560</subfield><subfield code="9">1-59749-956-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn811491532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn811491532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)811491532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043960077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1047</subfield><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shema, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking Web Apps</subfield><subfield code="b">Detecting and Preventing Web Application Security Problems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">297 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hacking Web Apps; Copyright; About the Author; Acknowledgements; Table of Contents; Introduction; 1 HTML5; The New Document Object Model (DOM); Cross-Origin Resource Sharing (CORS); WebSockets; Transferring Data; Data Frames; Security Considerations; Web Storage; IndexedDB; Web Workers; Flotsam & Jetsam; History API; Draft APIs; Summary; 2 HTML Injection & Cross-Site Scripting (XSS); Understanding HTML Injection; Identifying Points of Injection; URI Components; Form Fields; HTTP Request Headers & Cookies; JavaScript Object Notation (JSON); Document Object Model (DOM) Properties</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cascading Style Sheets (CSS)User-Generated Content; Identifying the Type of Reflection; Ephemeral; Persistent; Out of Band; Identifying the Injection's Rendered Context; Element Attributes; Elements & Text Nodes; JavaScript Variables; Syntax Delimiters; Putting the Hack Together; Abusing Character Sets; Attack Camouflage with Percent Encoding; Encoding 0X00-Nothing Really Matters; Alternate Encodings for the Same Character; Why Encoding Matters for HTML Injection; Exploiting Failure Modes; Bypassing Weak Exclusion Lists; Leveraging Browser Quirks; The Unusual Suspects; Subverting MIME Types</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Surprising MIME TypesSVG Markup; The Impact of XSS; Data Redirection; Employing Countermeasures; Fixing a Static Character Set; Normalizing Character Sets and Encoding; Encoding the Output; Beware of Exclusion Lists and Regexes; Reuse, Don't Reimplement, Code; JavaScript Sandboxes; HTML5 Sandboxes; Browsers' Built-In XSS Defenses; Summary; 3 Cross-Site Request Forgery (CSRF); Understanding Cross-Site Request Forgery; The Mechanics of CSRF; Request Forgery via Forced Browsing; POST Forgery; The Madness of Methods; Attacking Authenticated Actions without Passwords</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Dangerous Liaison: CSRF and HTML InjectionBe Wary of the Tangled Web; Variation on a Theme: Clickjacking; Employing Countermeasures; Heading in the Right Direction; A Dependable Origin; An Unreliable Referer1; Custom Headers: X-Marks-the-Spot; Shared Secrets; Mirror the Cookie; Require Manual Confirmation; Understanding Same Origin Policy; Anti-Framing via JavaScript; Framing the Solution; Defending the Web Browser; Vulnerability & Verisimilitude; Summary; 4 SQL Injection & Data Store Manipulation; Understanding SQL Injection; Hacking Tangents: Mathematical and Grammatical</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Breaking SQL StatementsBreaking Naive Defenses; Exploiting Errors; Inference; Data Truncation; Vivisecting the Database; Extracting Information with Stacked Queries; Controlling the Database & Operating System; Alternate Attack Vectors; Real-World SQL Injection; HTML5's Web Storage API; SQL Injection Without SQL; Employing Countermeasures; Validating Input; Securing the Statement; Parameterized Queries; Stored Procedures; NET Language-Integrated Query (LINQ); Protecting Information; Encrypting Data; Segregating Data; Stay Current with Database Patches; Summary</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web site development</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029368781</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043960077 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:47Z |
institution | BVB |
isbn | 9781597499569 1597499560 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029368781 |
oclc_num | 811491532 |
open_access_boolean | |
owner | DE-1047 DE-1046 |
owner_facet | DE-1047 DE-1046 |
physical | 297 pages |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier Science |
record_format | marc |
spelling | Shema, Mike Verfasser aut Hacking Web Apps Detecting and Preventing Web Application Security Problems Rockland, MA Elsevier Science 2012 297 pages txt rdacontent c rdamedia cr rdacarrier How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include Hacking Web Apps; Copyright; About the Author; Acknowledgements; Table of Contents; Introduction; 1 HTML5; The New Document Object Model (DOM); Cross-Origin Resource Sharing (CORS); WebSockets; Transferring Data; Data Frames; Security Considerations; Web Storage; IndexedDB; Web Workers; Flotsam & Jetsam; History API; Draft APIs; Summary; 2 HTML Injection & Cross-Site Scripting (XSS); Understanding HTML Injection; Identifying Points of Injection; URI Components; Form Fields; HTTP Request Headers & Cookies; JavaScript Object Notation (JSON); Document Object Model (DOM) Properties Cascading Style Sheets (CSS)User-Generated Content; Identifying the Type of Reflection; Ephemeral; Persistent; Out of Band; Identifying the Injection's Rendered Context; Element Attributes; Elements & Text Nodes; JavaScript Variables; Syntax Delimiters; Putting the Hack Together; Abusing Character Sets; Attack Camouflage with Percent Encoding; Encoding 0X00-Nothing Really Matters; Alternate Encodings for the Same Character; Why Encoding Matters for HTML Injection; Exploiting Failure Modes; Bypassing Weak Exclusion Lists; Leveraging Browser Quirks; The Unusual Suspects; Subverting MIME Types Surprising MIME TypesSVG Markup; The Impact of XSS; Data Redirection; Employing Countermeasures; Fixing a Static Character Set; Normalizing Character Sets and Encoding; Encoding the Output; Beware of Exclusion Lists and Regexes; Reuse, Don't Reimplement, Code; JavaScript Sandboxes; HTML5 Sandboxes; Browsers' Built-In XSS Defenses; Summary; 3 Cross-Site Request Forgery (CSRF); Understanding Cross-Site Request Forgery; The Mechanics of CSRF; Request Forgery via Forced Browsing; POST Forgery; The Madness of Methods; Attacking Authenticated Actions without Passwords Dangerous Liaison: CSRF and HTML InjectionBe Wary of the Tangled Web; Variation on a Theme: Clickjacking; Employing Countermeasures; Heading in the Right Direction; A Dependable Origin; An Unreliable Referer1; Custom Headers: X-Marks-the-Spot; Shared Secrets; Mirror the Cookie; Require Manual Confirmation; Understanding Same Origin Policy; Anti-Framing via JavaScript; Framing the Solution; Defending the Web Browser; Vulnerability & Verisimilitude; Summary; 4 SQL Injection & Data Store Manipulation; Understanding SQL Injection; Hacking Tangents: Mathematical and Grammatical Breaking SQL StatementsBreaking Naive Defenses; Exploiting Errors; Inference; Data Truncation; Vivisecting the Database; Extracting Information with Stacked Queries; Controlling the Database & Operating System; Alternate Attack Vectors; Real-World SQL Injection; HTML5's Web Storage API; SQL Injection Without SQL; Employing Countermeasures; Validating Input; Securing the Statement; Parameterized Queries; Stored Procedures; NET Language-Integrated Query (LINQ); Protecting Information; Encrypting Data; Segregating Data; Stay Current with Database Patches; Summary Computer networks / Security measures Computer networks Web sites / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer programs Security measures Web site development Security measures Computer crimes Prevention Computer security |
spellingShingle | Shema, Mike Hacking Web Apps Detecting and Preventing Web Application Security Problems Computer networks / Security measures Computer networks Web sites / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer programs Security measures Web site development Security measures Computer crimes Prevention Computer security |
title | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_auth | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_exact_search | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_full | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_fullStr | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_full_unstemmed | Hacking Web Apps Detecting and Preventing Web Application Security Problems |
title_short | Hacking Web Apps |
title_sort | hacking web apps detecting and preventing web application security problems |
title_sub | Detecting and Preventing Web Application Security Problems |
topic | Computer networks / Security measures Computer networks Web sites / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Application software Security measures Computer programs Security measures Web site development Security measures Computer crimes Prevention Computer security |
topic_facet | Computer networks / Security measures Computer networks Web sites / Security measures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Application software Security measures Computer programs Security measures Web site development Security measures Computer crimes Prevention Computer security |
work_keys_str_mv | AT shemamike hackingwebappsdetectingandpreventingwebapplicationsecurityproblems |