Developer's guide to web application security /:
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web applic...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxii, 489 pages) : illustrations |
ISBN: | 9781429456470 1429456477 9781597490610 159749061X 0080504094 9780080504094 1281060216 9781281060211 9786611060213 6611060219 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm85861133 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070315s2007 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OPELS |d BDX |d CCO |d E7B |d IDEBK |d UAB |d UV0 |d DKDLA |d ZCU |d MERUC |d EBLCP |d OCLCO |d NTE |d FVL |d B24X7 |d OCLCO |d OCLCF |d UMI |d OCLCQ |d OCLCO |d DEBBG |d NLGGC |d DEBSZ |d OCLCQ |d OCLCO |d AU@ |d OCLCQ |d COO |d AZK |d JBG |d AGLDB |d MOR |d PIFBR |d LIV |d OCLCQ |d U3W |d OCLCA |d ROC |d BRL |d STF |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d M8D |d VLY |d UKCRE |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 162131451 |a 182738752 |a 191035125 |a 228146840 |a 228146841 |a 474189573 |a 474270033 |a 507020880 |a 567955626 |a 647645246 |a 722531477 |a 728029629 |a 765142695 |a 780855212 |a 856961264 |a 873843500 |a 888763860 |a 961520361 |a 962663866 |a 962790746 |a 988532523 |a 991986946 |a 1020514096 |a 1037506792 |a 1038678879 |a 1045518088 |a 1055374628 |a 1076300945 |a 1081212179 |a 1153032991 |a 1162551258 |a 1228599855 |a 1235829557 |a 1240509398 | ||
020 | |a 9781429456470 |q (electronic bk.) | ||
020 | |a 1429456477 |q (electronic bk.) | ||
020 | |a 9781597490610 | ||
020 | |a 159749061X | ||
020 | |a 0080504094 | ||
020 | |a 9780080504094 | ||
020 | |a 1281060216 | ||
020 | |a 9781281060211 | ||
020 | |a 9786611060213 | ||
020 | |a 6611060219 | ||
024 | 1 | |a 792502090619 | |
035 | |a (OCoLC)85861133 |z (OCoLC)162131451 |z (OCoLC)182738752 |z (OCoLC)191035125 |z (OCoLC)228146840 |z (OCoLC)228146841 |z (OCoLC)474189573 |z (OCoLC)474270033 |z (OCoLC)507020880 |z (OCoLC)567955626 |z (OCoLC)647645246 |z (OCoLC)722531477 |z (OCoLC)728029629 |z (OCoLC)765142695 |z (OCoLC)780855212 |z (OCoLC)856961264 |z (OCoLC)873843500 |z (OCoLC)888763860 |z (OCoLC)961520361 |z (OCoLC)962663866 |z (OCoLC)962790746 |z (OCoLC)988532523 |z (OCoLC)991986946 |z (OCoLC)1020514096 |z (OCoLC)1037506792 |z (OCoLC)1038678879 |z (OCoLC)1045518088 |z (OCoLC)1055374628 |z (OCoLC)1076300945 |z (OCoLC)1081212179 |z (OCoLC)1153032991 |z (OCoLC)1162551258 |z (OCoLC)1228599855 |z (OCoLC)1235829557 |z (OCoLC)1240509398 | ||
037 | |a 133658:133783 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .C767 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Cross, Michael, |d 1965- |1 https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK |0 http://id.loc.gov/authorities/names/no2007080218 | |
245 | 1 | 0 | |a Developer's guide to web application security / |c Michael Cross. |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (xxii, 489 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. | |
520 | |a Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Web sites |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sites Web |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Web sites |x Security measures |2 fast | |
758 | |i has work: |a Developer's guide to web application security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGtGjh4w4d8yDPPxXth73 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Cross, Michael, 1965- |t Developer's guide to web application security. |d Rockland, MA : Syngress Pub., ©2007 |z 159749061X |z 9781597490610 |w (OCoLC)82366027 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490610 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184404 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00014077 | ||
938 | |a Brodart |b BROD |n 05489148 |c $49.95 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL289735 | ||
938 | |a ebrary |b EBRY |n ebr10156086 | ||
938 | |a EBSCOhost |b EBSC |n 184404 | ||
938 | |a Internet Archive |b INAR |n developersguidet0000cros | ||
938 | |a YBP Library Services |b YANK |n 2535076 | ||
938 | |a YBP Library Services |b YANK |n 2613884 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm85861133 |
---|---|
_version_ | 1816881645812187136 |
adam_text | |
any_adam_object | |
author | Cross, Michael, 1965- |
author_GND | http://id.loc.gov/authorities/names/no2007080218 |
author_facet | Cross, Michael, 1965- |
author_role | |
author_sort | Cross, Michael, 1965- |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .C767 2007eb |
callnumber-search | TK5105.59 .C767 2007eb |
callnumber-sort | TK 45105.59 C767 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. |
ctrlnum | (OCoLC)85861133 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06683cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm85861133 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070315s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">BDX</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">UAB</subfield><subfield code="d">UV0</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NTE</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">NLGGC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ROC</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162131451</subfield><subfield code="a">182738752</subfield><subfield code="a">191035125</subfield><subfield code="a">228146840</subfield><subfield code="a">228146841</subfield><subfield code="a">474189573</subfield><subfield code="a">474270033</subfield><subfield code="a">507020880</subfield><subfield code="a">567955626</subfield><subfield code="a">647645246</subfield><subfield code="a">722531477</subfield><subfield code="a">728029629</subfield><subfield code="a">765142695</subfield><subfield code="a">780855212</subfield><subfield code="a">856961264</subfield><subfield code="a">873843500</subfield><subfield code="a">888763860</subfield><subfield code="a">961520361</subfield><subfield code="a">962663866</subfield><subfield code="a">962790746</subfield><subfield code="a">988532523</subfield><subfield code="a">991986946</subfield><subfield code="a">1020514096</subfield><subfield code="a">1037506792</subfield><subfield code="a">1038678879</subfield><subfield code="a">1045518088</subfield><subfield code="a">1055374628</subfield><subfield code="a">1076300945</subfield><subfield code="a">1081212179</subfield><subfield code="a">1153032991</subfield><subfield code="a">1162551258</subfield><subfield code="a">1228599855</subfield><subfield code="a">1235829557</subfield><subfield code="a">1240509398</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429456470</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429456477</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490610</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749061X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080504094</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080504094</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281060216</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281060211</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611060213</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611060219</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502090619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85861133</subfield><subfield code="z">(OCoLC)162131451</subfield><subfield code="z">(OCoLC)182738752</subfield><subfield code="z">(OCoLC)191035125</subfield><subfield code="z">(OCoLC)228146840</subfield><subfield code="z">(OCoLC)228146841</subfield><subfield code="z">(OCoLC)474189573</subfield><subfield code="z">(OCoLC)474270033</subfield><subfield code="z">(OCoLC)507020880</subfield><subfield code="z">(OCoLC)567955626</subfield><subfield code="z">(OCoLC)647645246</subfield><subfield code="z">(OCoLC)722531477</subfield><subfield code="z">(OCoLC)728029629</subfield><subfield code="z">(OCoLC)765142695</subfield><subfield code="z">(OCoLC)780855212</subfield><subfield code="z">(OCoLC)856961264</subfield><subfield code="z">(OCoLC)873843500</subfield><subfield code="z">(OCoLC)888763860</subfield><subfield code="z">(OCoLC)961520361</subfield><subfield code="z">(OCoLC)962663866</subfield><subfield code="z">(OCoLC)962790746</subfield><subfield code="z">(OCoLC)988532523</subfield><subfield code="z">(OCoLC)991986946</subfield><subfield code="z">(OCoLC)1020514096</subfield><subfield code="z">(OCoLC)1037506792</subfield><subfield code="z">(OCoLC)1038678879</subfield><subfield code="z">(OCoLC)1045518088</subfield><subfield code="z">(OCoLC)1055374628</subfield><subfield code="z">(OCoLC)1076300945</subfield><subfield code="z">(OCoLC)1081212179</subfield><subfield code="z">(OCoLC)1153032991</subfield><subfield code="z">(OCoLC)1162551258</subfield><subfield code="z">(OCoLC)1228599855</subfield><subfield code="z">(OCoLC)1235829557</subfield><subfield code="z">(OCoLC)1240509398</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">133658:133783</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C767 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cross, Michael,</subfield><subfield code="d">1965-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007080218</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Developer's guide to web application security /</subfield><subfield code="c">Michael Cross.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 489 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Developer's guide to web application security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGGtGjh4w4d8yDPPxXth73</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cross, Michael, 1965-</subfield><subfield code="t">Developer's guide to web application security.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2007</subfield><subfield code="z">159749061X</subfield><subfield code="z">9781597490610</subfield><subfield code="w">(OCoLC)82366027</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490610</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184404</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00014077</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Brodart</subfield><subfield code="b">BROD</subfield><subfield code="n">05489148</subfield><subfield code="c">$49.95</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL289735</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10156086</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">184404</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">developersguidet0000cros</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2535076</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613884</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm85861133 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:01Z |
institution | BVB |
isbn | 9781429456470 1429456477 9781597490610 159749061X 0080504094 9780080504094 1281060216 9781281060211 9786611060213 6611060219 |
language | English |
oclc_num | 85861133 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxii, 489 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Cross, Michael, 1965- https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK http://id.loc.gov/authorities/names/no2007080218 Developer's guide to web application security / Michael Cross. Rockland, MA : Syngress Pub., ©2007. 1 online resource (xxii, 489 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes index. Print version record. Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Web sites Security measures fast has work: Developer's guide to web application security (Text) https://id.oclc.org/worldcat/entity/E39PCGGtGjh4w4d8yDPPxXth73 https://id.oclc.org/worldcat/ontology/hasWork Print version: Cross, Michael, 1965- Developer's guide to web application security. Rockland, MA : Syngress Pub., ©2007 159749061X 9781597490610 (OCoLC)82366027 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490610 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184404 Volltext |
spellingShingle | Cross, Michael, 1965- Developer's guide to web application security / Cover; Contents; Chapter 1: Hacking Methodology; Chapter 2: How to Avoid Becoming a Code Grinder; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter 5: Hacking Techniques and Tools; Chapter 6: Code Auditing and Reverse Engineeering; Chapter 7: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls; Chapter 10: Securing ColdFusion; Chapter 11: Developing Security-Enabled Applications; Chapter 12: Cradle to Grave: Working with a Security Plan; Index. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Web sites Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Developer's guide to web application security / |
title_auth | Developer's guide to web application security / |
title_exact_search | Developer's guide to web application security / |
title_full | Developer's guide to web application security / Michael Cross. |
title_fullStr | Developer's guide to web application security / Michael Cross. |
title_full_unstemmed | Developer's guide to web application security / Michael Cross. |
title_short | Developer's guide to web application security / |
title_sort | developer s guide to web application security |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Web sites Security measures fast |
topic_facet | Computer networks Security measures. Web sites Security measures. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Web sites Security measures |
url | https://www.sciencedirect.com/science/book/9781597490610 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184404 |
work_keys_str_mv | AT crossmichael developersguidetowebapplicationsecurity |