Hack proofing your Web applications:
From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web A...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
© 2001
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs |
Beschreibung: | Includes index. - "The only way to stop a hacker is to think like one." |
Beschreibung: | 1 online resource (xxvii, 595 pages) illustrations |
ISBN: | 9781928994312 1928994318 0080478131 9780080478135 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124506 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2001 |||| o||u| ||||||eng d | ||
020 | |a 9781928994312 |9 978-1-928994-31-2 | ||
020 | |a 1928994318 |9 1-928994-31-8 | ||
020 | |a 0080478131 |9 0-08-047813-1 | ||
020 | |a 9780080478135 |9 978-0-08-047813-5 | ||
035 | |a (ZDB-33-ESD)ocn162598289 | ||
035 | |a (OCoLC)162598289 | ||
035 | |a (DE-599)BVBBV046124506 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Hack proofing your Web applications |c technical edit by Julie Traxler |
246 | 1 | 3 | |a Hackproofing your Web applications |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c © 2001 | |
300 | |a 1 online resource (xxvii, 595 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - "The only way to stop a hacker is to think like one." | ||
520 | |a From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 7 | |a Web sites / Design |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Web sites |x Design | |
700 | 1 | |a Traxler, Julie |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781928994312 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504960 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781928994312 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442600964096 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124506 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162598289 (OCoLC)162598289 (DE-599)BVBBV046124506 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02673nmm a2200469zc 4500</leader><controlfield tag="001">BV046124506</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994312</subfield><subfield code="9">978-1-928994-31-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994318</subfield><subfield code="9">1-928994-31-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478131</subfield><subfield code="9">0-08-047813-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478135</subfield><subfield code="9">978-0-08-047813-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162598289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162598289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124506</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your Web applications</subfield><subfield code="c">technical edit by Julie Traxler</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hackproofing your Web applications</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 595 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - "The only way to stop a hacker is to think like one."</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites / Design</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Design</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Traxler, Julie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781928994312</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504960</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781928994312</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124506 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781928994312 1928994318 0080478131 9780080478135 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504960 |
oclc_num | 162598289 |
open_access_boolean | |
physical | 1 online resource (xxvii, 595 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Hack proofing your Web applications technical edit by Julie Traxler Hackproofing your Web applications Rockland, Mass. Syngress Pub. © 2001 1 online resource (xxvii, 595 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index. - "The only way to stop a hacker is to think like one." From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design Traxler, Julie Sonstige oth http://www.sciencedirect.com/science/book/9781928994312 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Hack proofing your Web applications Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design |
title | Hack proofing your Web applications |
title_alt | Hackproofing your Web applications |
title_auth | Hack proofing your Web applications |
title_exact_search | Hack proofing your Web applications |
title_full | Hack proofing your Web applications technical edit by Julie Traxler |
title_fullStr | Hack proofing your Web applications technical edit by Julie Traxler |
title_full_unstemmed | Hack proofing your Web applications technical edit by Julie Traxler |
title_short | Hack proofing your Web applications |
title_sort | hack proofing your web applications |
topic | Computer networks / Security measures fast Computer security fast Internet / Security measures fast Web sites / Design fast Computer security Internet Security measures Computer networks Security measures Web sites Design |
topic_facet | Computer networks / Security measures Computer security Internet / Security measures Web sites / Design Internet Security measures Computer networks Security measures Web sites Design |
url | http://www.sciencedirect.com/science/book/9781928994312 |
work_keys_str_mv | AT traxlerjulie hackproofingyourwebapplications |