Web application vulnerabilities :: detect, exploit, prevent /
"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to f...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass. :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume)) |
ISBN: | 9780080556642 0080556647 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn298103826 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 081212s2007 maua o 001 0 eng d | ||
040 | |a YUS |b eng |e pn |c YUS |d N$T |d YDXCP |d UAB |d IDEBK |d E7B |d OCLCQ |d UMI |d CEF |d NHM |d OCLCQ |d B24X7 |d DEBSZ |d OCLCQ |d OCLCO |d OCLCQ |d VLB |d OCLCQ |d UIU |d OPELS |d DKDLA |d OCLCQ |d COO |d OCLCQ |d AGLDB |d LIV |d OCLCA |d OCLCQ |d OCLCF |d JBG |d D6H |d OCLCQ |d VTS |d AU@ |d S9I |d STF |d LEAUB |d M8D |d WYU |d VT2 |d BRF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 190824302 |a 228148127 |a 268792862 |a 319430078 |a 473205423 |a 647692001 |a 1044582401 |a 1062879538 |a 1103281072 |a 1129378669 |a 1152977254 |a 1179796542 | ||
020 | |a 9780080556642 |q (electronic bk.) | ||
020 | |a 0080556647 |q (electronic bk.) | ||
020 | |z 1597492094 | ||
020 | |z 9781597492096 | ||
035 | |a (OCoLC)298103826 |z (OCoLC)190824302 |z (OCoLC)228148127 |z (OCoLC)268792862 |z (OCoLC)319430078 |z (OCoLC)473205423 |z (OCoLC)647692001 |z (OCoLC)1044582401 |z (OCoLC)1062879538 |z (OCoLC)1103281072 |z (OCoLC)1129378669 |z (OCoLC)1152977254 |z (OCoLC)1179796542 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a QA76.76.A65 |b W428 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Web application vulnerabilities : |b detect, exploit, prevent / |c Michael Cross [and others]. |
260 | |a Burlington, Mass. : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (1 volume)) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
505 | 0 | |a Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services. | |
520 | 1 | |a "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket | |
588 | 0 | |a Print version record. | |
500 | |a Includes index. | ||
650 | 0 | |a Application software |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Logiciels d'application |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Cross, Michael, |d 1965- |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK |0 http://id.loc.gov/authorities/names/no2007080218 | |
758 | |i has work: |a Web application vulnerabilities (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGKDmqPcXhRRKX7BPTJ6Bq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Cross, Michael, 1965- |t Web application vunerabilities. |d Burlington, MA : Syngress, ©2007 |z 1597492094 |z 9781597492096 |w (OCoLC)171111159 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597492096 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597492096 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750 |3 Volltext | |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00025456 | ||
938 | |a EBSCOhost |b EBSC |n 214750 | ||
938 | |a YBP Library Services |b YANK |n 2758446 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn298103826 |
---|---|
_version_ | 1813903332099489792 |
adam_text | |
any_adam_object | |
author | Cross, Michael, 1965- |
author_GND | http://id.loc.gov/authorities/names/no2007080218 |
author_facet | Cross, Michael, 1965- |
author_role | aut |
author_sort | Cross, Michael, 1965- |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.A65 W428 2007eb |
callnumber-search | QA76.76.A65 W428 2007eb |
callnumber-sort | QA 276.76 A65 W428 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services. |
ctrlnum | (OCoLC)298103826 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03949cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn298103826</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">081212s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YUS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">YUS</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UAB</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">NHM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UIU</subfield><subfield code="d">OPELS</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">JBG</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">AU@</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">WYU</subfield><subfield code="d">VT2</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">190824302</subfield><subfield code="a">228148127</subfield><subfield code="a">268792862</subfield><subfield code="a">319430078</subfield><subfield code="a">473205423</subfield><subfield code="a">647692001</subfield><subfield code="a">1044582401</subfield><subfield code="a">1062879538</subfield><subfield code="a">1103281072</subfield><subfield code="a">1129378669</subfield><subfield code="a">1152977254</subfield><subfield code="a">1179796542</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556642</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556647</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597492094</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597492096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298103826</subfield><subfield code="z">(OCoLC)190824302</subfield><subfield code="z">(OCoLC)228148127</subfield><subfield code="z">(OCoLC)268792862</subfield><subfield code="z">(OCoLC)319430078</subfield><subfield code="z">(OCoLC)473205423</subfield><subfield code="z">(OCoLC)647692001</subfield><subfield code="z">(OCoLC)1044582401</subfield><subfield code="z">(OCoLC)1062879538</subfield><subfield code="z">(OCoLC)1103281072</subfield><subfield code="z">(OCoLC)1129378669</subfield><subfield code="z">(OCoLC)1152977254</subfield><subfield code="z">(OCoLC)1179796542</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000038</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.A65</subfield><subfield code="b">W428 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Web application vulnerabilities :</subfield><subfield code="b">detect, exploit, prevent /</subfield><subfield code="c">Michael Cross [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services.</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael,</subfield><subfield code="d">1965-</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007080218</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Web application vulnerabilities (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGKDmqPcXhRRKX7BPTJ6Bq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cross, Michael, 1965-</subfield><subfield code="t">Web application vunerabilities.</subfield><subfield code="d">Burlington, MA : Syngress, ©2007</subfield><subfield code="z">1597492094</subfield><subfield code="z">9781597492096</subfield><subfield code="w">(OCoLC)171111159</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597492096</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597492096</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00025456</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">214750</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2758446</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn298103826 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:17:00Z |
institution | BVB |
isbn | 9780080556642 0080556647 |
language | English |
oclc_num | 298103826 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (1 volume)) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Web application vulnerabilities : detect, exploit, prevent / Michael Cross [and others]. Burlington, Mass. : Syngress Pub., ©2007. 1 online resource (1 volume)) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services. "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket Print version record. Includes index. Application software Security measures. Computer security. Logiciels d'application Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Cross, Michael, 1965- aut https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK http://id.loc.gov/authorities/names/no2007080218 has work: Web application vulnerabilities (Text) https://id.oclc.org/worldcat/entity/E39PCGKDmqPcXhRRKX7BPTJ6Bq https://id.oclc.org/worldcat/ontology/hasWork Print version: Cross, Michael, 1965- Web application vunerabilities. Burlington, MA : Syngress, ©2007 1597492094 9781597492096 (OCoLC)171111159 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597492096 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597492096 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750 Volltext |
spellingShingle | Cross, Michael, 1965- Web application vulnerabilities : detect, exploit, prevent / Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services. Application software Security measures. Computer security. Logiciels d'application Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast |
title | Web application vulnerabilities : detect, exploit, prevent / |
title_auth | Web application vulnerabilities : detect, exploit, prevent / |
title_exact_search | Web application vulnerabilities : detect, exploit, prevent / |
title_full | Web application vulnerabilities : detect, exploit, prevent / Michael Cross [and others]. |
title_fullStr | Web application vulnerabilities : detect, exploit, prevent / Michael Cross [and others]. |
title_full_unstemmed | Web application vulnerabilities : detect, exploit, prevent / Michael Cross [and others]. |
title_short | Web application vulnerabilities : |
title_sort | web application vulnerabilities detect exploit prevent |
title_sub | detect, exploit, prevent / |
topic | Application software Security measures. Computer security. Logiciels d'application Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast |
topic_facet | Application software Security measures. Computer security. Logiciels d'application Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security |
url | https://www.sciencedirect.com/science/book/9781597492096 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214750 |
work_keys_str_mv | AT crossmichael webapplicationvulnerabilitiesdetectexploitprevent |