Web application security: exploitation and countermeasures for modern web applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Beijing
O'Reilly
January 2024
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-863 DE-862 |
Beschreibung: | 1 Online-Ressource (xxxiii, 405 Seiten) |
ISBN: | 9781098143909 9781098143893 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049537575 | ||
003 | DE-604 | ||
005 | 20241125 | ||
007 | cr|uuu---uuuuu | ||
008 | 240207s2024 xx o|||| 00||| eng d | ||
020 | |a 9781098143909 |c ebook |9 978-1-098-14390-9 | ||
020 | |a 9781098143893 |c ebook |9 978-1-098-14389-3 | ||
035 | |a (OCoLC)1422450954 | ||
035 | |a (DE-599)BVBBV049537575 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-863 |a DE-862 | ||
084 | |a ST 252 |0 (DE-625)143627: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Hoffman, Andrew |e Verfasser |0 (DE-588)1222926202 |4 aut | |
245 | 1 | 0 | |a Web application security |b exploitation and countermeasures for modern web applications |c Andrew Hoffman |
250 | |a Second edition | ||
264 | 1 | |a Beijing |b O'Reilly |c January 2024 | |
300 | |a 1 Online-Ressource (xxxiii, 405 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Intro -- Copyright -- Table of Contents -- Preface -- Changes from the First Edition -- Prerequisite Knowledge and Learning Goals -- Why Are Examples in JavaScript? -- Why Teach Concepts Instead of Tools? -- Suggested Background -- Minimum Required Skills -- Who Benefits Most from Reading This Book? -- Software Engineers and Web Application Developers -- General Learning Goals -- Security Engineers, Pen Testers, and Bug Bounty Hunters -- How Is This Book Organized? -- Recon -- Offense -- Defense -- Language and Terminology -- Summary -- Conventions Used in This Book | |
505 | 8 | |a O'Reilly Online Learning -- How to Contact Us -- Acknowledgments -- Chapter 1. The History of Software Security -- The Origins of Hacking -- The Enigma Machine, Circa 1930 -- Automated Enigma Code Cracking, Circa 1940 -- Telephone "Phreaking," Circa 1950 -- Anti-Phreaking Technology, Circa 1960 -- The Origins of Computer Hacking, Circa 1980 -- The Rise of the World Wide Web, Circa 2000 -- Hackers in the Modern Era, Circa 2015+ -- Summary -- Part I. Recon -- Chapter 2. Introduction to Web Application Reconnaissance -- Information Gathering -- Web Application Mapping -- Summary | |
505 | 8 | |a Chapter 3. The Structure of a Modern Web Application -- Modern Versus Legacy Web Applications -- REST APIs -- JavaScript Object Notation -- JavaScript -- Variables and Scope -- Functions -- Context -- Prototypal Inheritance -- Asynchrony -- Browser DOM -- SPA Frameworks -- Authentication and Authorization Systems -- Authentication -- Authorization -- Web Servers -- Server-Side Databases -- Client-Side Data Stores -- GraphQL -- Version Control Systems -- CDN/Cache -- Summary -- Chapter 4. Finding Subdomains -- Multiple Applications per Domain -- The Browser's Built-In Network Analysis Tools | |
505 | 8 | |a Taking Advantage of Public Records -- Search Engine Caches -- Accidental Archives -- Social Snapshots -- Zone Transfer Attacks -- Brute Forcing Subdomains -- Dictionary Attacks -- Summary -- Chapter 5. API Analysis -- Endpoint Discovery -- Authentication Mechanisms -- Endpoint Shapes -- Common Shapes -- Application-Specific Shapes -- Summary -- Chapter 6. Identifying Third-Party Dependencies -- Detecting Client-Side Frameworks -- Detecting SPA Frameworks -- Detecting JavaScript Libraries -- Detecting CSS Libraries -- Detecting Server-Side Frameworks -- Header Detection | |
505 | 8 | |a Default Error Messages and 404 Pages -- Database Detection -- Summary -- Chapter 7. Identifying Weak Points in Application Architecture -- Secure Versus Insecure Architecture Signals -- Multiple Layers of Security -- Adoption and Reinvention -- Summary -- Chapter 8. Part I Summary -- Part II. Offense -- Chapter 9. Introduction to Hacking Web Applications -- The Hacker's Mindset -- Applied Recon -- Chapter 10. Cross-Site Scripting -- XSS Discovery and Exploitation -- Stored XSS -- Reflected XSS -- DOM-Based XSS -- Mutation-Based XSS -- Bypassing Filters -- Self-Closing HTML Tags | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmierung |0 (DE-588)4076370-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Web-Seite |0 (DE-588)4356308-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Web-Seite |0 (DE-588)4356308-9 |D s |
689 | 0 | 2 | |a Programmierung |0 (DE-588)4076370-5 |D s |
689 | 0 | 3 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-098-14393-0 |
912 | |a ZDB-30-PQE | ||
912 | |a ebook | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034883029 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=31071624 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3776913 |l DE-863 |p ebook |x Aggregator |3 Volltext | |
966 | e | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3776913 |l DE-862 |p ebook |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1079053 |
---|---|
_version_ | 1819651809218658304 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Hoffman, Andrew |
author_GND | (DE-588)1222926202 |
author_facet | Hoffman, Andrew |
author_role | aut |
author_sort | Hoffman, Andrew |
author_variant | a h ah |
building | Verbundindex |
bvnumber | BV049537575 |
classification_rvk | ST 252 ST 277 |
collection | ZDB-30-PQE ebook |
contents | Intro -- Copyright -- Table of Contents -- Preface -- Changes from the First Edition -- Prerequisite Knowledge and Learning Goals -- Why Are Examples in JavaScript? -- Why Teach Concepts Instead of Tools? -- Suggested Background -- Minimum Required Skills -- Who Benefits Most from Reading This Book? -- Software Engineers and Web Application Developers -- General Learning Goals -- Security Engineers, Pen Testers, and Bug Bounty Hunters -- How Is This Book Organized? -- Recon -- Offense -- Defense -- Language and Terminology -- Summary -- Conventions Used in This Book O'Reilly Online Learning -- How to Contact Us -- Acknowledgments -- Chapter 1. The History of Software Security -- The Origins of Hacking -- The Enigma Machine, Circa 1930 -- Automated Enigma Code Cracking, Circa 1940 -- Telephone "Phreaking," Circa 1950 -- Anti-Phreaking Technology, Circa 1960 -- The Origins of Computer Hacking, Circa 1980 -- The Rise of the World Wide Web, Circa 2000 -- Hackers in the Modern Era, Circa 2015+ -- Summary -- Part I. Recon -- Chapter 2. Introduction to Web Application Reconnaissance -- Information Gathering -- Web Application Mapping -- Summary Chapter 3. The Structure of a Modern Web Application -- Modern Versus Legacy Web Applications -- REST APIs -- JavaScript Object Notation -- JavaScript -- Variables and Scope -- Functions -- Context -- Prototypal Inheritance -- Asynchrony -- Browser DOM -- SPA Frameworks -- Authentication and Authorization Systems -- Authentication -- Authorization -- Web Servers -- Server-Side Databases -- Client-Side Data Stores -- GraphQL -- Version Control Systems -- CDN/Cache -- Summary -- Chapter 4. Finding Subdomains -- Multiple Applications per Domain -- The Browser's Built-In Network Analysis Tools Taking Advantage of Public Records -- Search Engine Caches -- Accidental Archives -- Social Snapshots -- Zone Transfer Attacks -- Brute Forcing Subdomains -- Dictionary Attacks -- Summary -- Chapter 5. API Analysis -- Endpoint Discovery -- Authentication Mechanisms -- Endpoint Shapes -- Common Shapes -- Application-Specific Shapes -- Summary -- Chapter 6. Identifying Third-Party Dependencies -- Detecting Client-Side Frameworks -- Detecting SPA Frameworks -- Detecting JavaScript Libraries -- Detecting CSS Libraries -- Detecting Server-Side Frameworks -- Header Detection Default Error Messages and 404 Pages -- Database Detection -- Summary -- Chapter 7. Identifying Weak Points in Application Architecture -- Secure Versus Insecure Architecture Signals -- Multiple Layers of Security -- Adoption and Reinvention -- Summary -- Chapter 8. Part I Summary -- Part II. Offense -- Chapter 9. Introduction to Hacking Web Applications -- The Hacker's Mindset -- Applied Recon -- Chapter 10. Cross-Site Scripting -- XSS Discovery and Exploitation -- Stored XSS -- Reflected XSS -- DOM-Based XSS -- Mutation-Based XSS -- Bypassing Filters -- Self-Closing HTML Tags |
ctrlnum | (OCoLC)1422450954 (DE-599)BVBBV049537575 |
discipline | Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049537575</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241125</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240207s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098143909</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-098-14390-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098143893</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-098-14389-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422450954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049537575</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 252</subfield><subfield code="0">(DE-625)143627:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hoffman, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1222926202</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web application security</subfield><subfield code="b">exploitation and countermeasures for modern web applications</subfield><subfield code="c">Andrew Hoffman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">January 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiii, 405 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Copyright -- Table of Contents -- Preface -- Changes from the First Edition -- Prerequisite Knowledge and Learning Goals -- Why Are Examples in JavaScript? -- Why Teach Concepts Instead of Tools? -- Suggested Background -- Minimum Required Skills -- Who Benefits Most from Reading This Book? -- Software Engineers and Web Application Developers -- General Learning Goals -- Security Engineers, Pen Testers, and Bug Bounty Hunters -- How Is This Book Organized? -- Recon -- Offense -- Defense -- Language and Terminology -- Summary -- Conventions Used in This Book</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">O'Reilly Online Learning -- How to Contact Us -- Acknowledgments -- Chapter 1. The History of Software Security -- The Origins of Hacking -- The Enigma Machine, Circa 1930 -- Automated Enigma Code Cracking, Circa 1940 -- Telephone "Phreaking," Circa 1950 -- Anti-Phreaking Technology, Circa 1960 -- The Origins of Computer Hacking, Circa 1980 -- The Rise of the World Wide Web, Circa 2000 -- Hackers in the Modern Era, Circa 2015+ -- Summary -- Part I. Recon -- Chapter 2. Introduction to Web Application Reconnaissance -- Information Gathering -- Web Application Mapping -- Summary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3. The Structure of a Modern Web Application -- Modern Versus Legacy Web Applications -- REST APIs -- JavaScript Object Notation -- JavaScript -- Variables and Scope -- Functions -- Context -- Prototypal Inheritance -- Asynchrony -- Browser DOM -- SPA Frameworks -- Authentication and Authorization Systems -- Authentication -- Authorization -- Web Servers -- Server-Side Databases -- Client-Side Data Stores -- GraphQL -- Version Control Systems -- CDN/Cache -- Summary -- Chapter 4. Finding Subdomains -- Multiple Applications per Domain -- The Browser's Built-In Network Analysis Tools</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Taking Advantage of Public Records -- Search Engine Caches -- Accidental Archives -- Social Snapshots -- Zone Transfer Attacks -- Brute Forcing Subdomains -- Dictionary Attacks -- Summary -- Chapter 5. API Analysis -- Endpoint Discovery -- Authentication Mechanisms -- Endpoint Shapes -- Common Shapes -- Application-Specific Shapes -- Summary -- Chapter 6. Identifying Third-Party Dependencies -- Detecting Client-Side Frameworks -- Detecting SPA Frameworks -- Detecting JavaScript Libraries -- Detecting CSS Libraries -- Detecting Server-Side Frameworks -- Header Detection</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Default Error Messages and 404 Pages -- Database Detection -- Summary -- Chapter 7. Identifying Weak Points in Application Architecture -- Secure Versus Insecure Architecture Signals -- Multiple Layers of Security -- Adoption and Reinvention -- Summary -- Chapter 8. Part I Summary -- Part II. Offense -- Chapter 9. Introduction to Hacking Web Applications -- The Hacker's Mindset -- Applied Recon -- Chapter 10. Cross-Site Scripting -- XSS Discovery and Exploitation -- Stored XSS -- Reflected XSS -- DOM-Based XSS -- Mutation-Based XSS -- Bypassing Filters -- Self-Closing HTML Tags</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmierung</subfield><subfield code="0">(DE-588)4076370-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web-Seite</subfield><subfield code="0">(DE-588)4356308-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Web-Seite</subfield><subfield code="0">(DE-588)4356308-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Programmierung</subfield><subfield code="0">(DE-588)4076370-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-098-14393-0</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034883029</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=31071624</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3776913</subfield><subfield code="l">DE-863</subfield><subfield code="p">ebook</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3776913</subfield><subfield code="l">DE-862</subfield><subfield code="p">ebook</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049537575 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:27:59Z |
indexdate | 2024-12-28T04:06:35Z |
institution | BVB |
isbn | 9781098143909 9781098143893 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034883029 |
oclc_num | 1422450954 |
open_access_boolean | |
owner | DE-1050 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-1050 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (xxxiii, 405 Seiten) |
psigel | ZDB-30-PQE ebook ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly |
record_format | marc |
spellingShingle | Hoffman, Andrew Web application security exploitation and countermeasures for modern web applications Intro -- Copyright -- Table of Contents -- Preface -- Changes from the First Edition -- Prerequisite Knowledge and Learning Goals -- Why Are Examples in JavaScript? -- Why Teach Concepts Instead of Tools? -- Suggested Background -- Minimum Required Skills -- Who Benefits Most from Reading This Book? -- Software Engineers and Web Application Developers -- General Learning Goals -- Security Engineers, Pen Testers, and Bug Bounty Hunters -- How Is This Book Organized? -- Recon -- Offense -- Defense -- Language and Terminology -- Summary -- Conventions Used in This Book O'Reilly Online Learning -- How to Contact Us -- Acknowledgments -- Chapter 1. The History of Software Security -- The Origins of Hacking -- The Enigma Machine, Circa 1930 -- Automated Enigma Code Cracking, Circa 1940 -- Telephone "Phreaking," Circa 1950 -- Anti-Phreaking Technology, Circa 1960 -- The Origins of Computer Hacking, Circa 1980 -- The Rise of the World Wide Web, Circa 2000 -- Hackers in the Modern Era, Circa 2015+ -- Summary -- Part I. Recon -- Chapter 2. Introduction to Web Application Reconnaissance -- Information Gathering -- Web Application Mapping -- Summary Chapter 3. The Structure of a Modern Web Application -- Modern Versus Legacy Web Applications -- REST APIs -- JavaScript Object Notation -- JavaScript -- Variables and Scope -- Functions -- Context -- Prototypal Inheritance -- Asynchrony -- Browser DOM -- SPA Frameworks -- Authentication and Authorization Systems -- Authentication -- Authorization -- Web Servers -- Server-Side Databases -- Client-Side Data Stores -- GraphQL -- Version Control Systems -- CDN/Cache -- Summary -- Chapter 4. Finding Subdomains -- Multiple Applications per Domain -- The Browser's Built-In Network Analysis Tools Taking Advantage of Public Records -- Search Engine Caches -- Accidental Archives -- Social Snapshots -- Zone Transfer Attacks -- Brute Forcing Subdomains -- Dictionary Attacks -- Summary -- Chapter 5. API Analysis -- Endpoint Discovery -- Authentication Mechanisms -- Endpoint Shapes -- Common Shapes -- Application-Specific Shapes -- Summary -- Chapter 6. Identifying Third-Party Dependencies -- Detecting Client-Side Frameworks -- Detecting SPA Frameworks -- Detecting JavaScript Libraries -- Detecting CSS Libraries -- Detecting Server-Side Frameworks -- Header Detection Default Error Messages and 404 Pages -- Database Detection -- Summary -- Chapter 7. Identifying Weak Points in Application Architecture -- Secure Versus Insecure Architecture Signals -- Multiple Layers of Security -- Adoption and Reinvention -- Summary -- Chapter 8. Part I Summary -- Part II. Offense -- Chapter 9. Introduction to Hacking Web Applications -- The Hacker's Mindset -- Applied Recon -- Chapter 10. Cross-Site Scripting -- XSS Discovery and Exploitation -- Stored XSS -- Reflected XSS -- DOM-Based XSS -- Mutation-Based XSS -- Bypassing Filters -- Self-Closing HTML Tags Computersicherheit (DE-588)4274324-2 gnd Softwareschutz (DE-588)4131649-6 gnd Programmierung (DE-588)4076370-5 gnd Web-Seite (DE-588)4356308-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4131649-6 (DE-588)4076370-5 (DE-588)4356308-9 |
title | Web application security exploitation and countermeasures for modern web applications |
title_auth | Web application security exploitation and countermeasures for modern web applications |
title_exact_search | Web application security exploitation and countermeasures for modern web applications |
title_exact_search_txtP | Web application security exploitation and countermeasures for modern web applications |
title_full | Web application security exploitation and countermeasures for modern web applications Andrew Hoffman |
title_fullStr | Web application security exploitation and countermeasures for modern web applications Andrew Hoffman |
title_full_unstemmed | Web application security exploitation and countermeasures for modern web applications Andrew Hoffman |
title_short | Web application security |
title_sort | web application security exploitation and countermeasures for modern web applications |
title_sub | exploitation and countermeasures for modern web applications |
topic | Computersicherheit (DE-588)4274324-2 gnd Softwareschutz (DE-588)4131649-6 gnd Programmierung (DE-588)4076370-5 gnd Web-Seite (DE-588)4356308-9 gnd |
topic_facet | Computersicherheit Softwareschutz Programmierung Web-Seite |
work_keys_str_mv | AT hoffmanandrew webapplicationsecurityexploitationandcountermeasuresformodernwebapplications |