Hacking web apps :: detecting and preventing web application security problems /
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA :
Syngress,
©2012.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781597499569 1597499560 1283578824 9781283578820 9786613891273 6613891274 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn809248723 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120906s2012 mau ob 001 0 eng d | ||
010 | |z 2012025821 | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d UMI |d COO |d B24X7 |d E7B |d DEBSZ |d OCLCO |d OCLCQ |d UIU |d TEFOD |d OCLCQ |d OCLCO |d TEFOD |d OCLCO |d OCLCQ |d OCLCO |d LOA |d OCLCO |d LVT |d K6U |d AGLDB |d PIFAG |d FVL |d LIV |d OCLCQ |d OCLCA |d U3W |d OCLCA |d D6H |d OCLCF |d STF |d WRM |d CEF |d OCLCQ |d WYU |d UAB |d LEAUB |d UKAHL |d VT2 |d UKCRE |d OCLCQ |d OCLCO |d QGK |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 826867566 |a 962188849 |a 972036483 |a 992094475 |a 1037699838 |a 1038689086 |a 1103262376 |a 1129366476 |a 1153545524 |a 1202548054 |a 1240523271 |a 1259064088 | ||
020 | |a 9781597499569 |q (electronic bk.) | ||
020 | |a 1597499560 |q (electronic bk.) | ||
020 | |z 9781597499514 | ||
020 | |z 159749951X | ||
020 | |a 1283578824 | ||
020 | |a 9781283578820 | ||
020 | |a 9786613891273 | ||
020 | |a 6613891274 | ||
035 | |a (OCoLC)809248723 |z (OCoLC)826867566 |z (OCoLC)962188849 |z (OCoLC)972036483 |z (OCoLC)992094475 |z (OCoLC)1037699838 |z (OCoLC)1038689086 |z (OCoLC)1103262376 |z (OCoLC)1129366476 |z (OCoLC)1153545524 |z (OCoLC)1202548054 |z (OCoLC)1240523271 |z (OCoLC)1259064088 | ||
037 | |a CL0500000190 |b Safari Books Online | ||
037 | |a 24FC4A48-16E3-4C31-A2CF-F32652230C8D |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 |b .S5234 2012 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Shema, Mike. |1 https://id.oclc.org/worldcat/entity/E39PCjKTQqp8BqgCppCDgPHpyd |0 http://id.loc.gov/authorities/names/no2002079897 | |
245 | 1 | 0 | |a Hacking web apps : |b detecting and preventing web application security problems / |c Mike Shema. |
260 | |a Waltham, MA : |b Syngress, |c ©2012. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
520 | |a How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. | |
546 | |a English. | ||
650 | 0 | |a Application software |x Security measures. | |
650 | 0 | |a Computer programs |x Security measures. | |
650 | 0 | |a Web site development |x Security measures. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Logiciels d'application |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels |x Sécurité |x Mesures. | |
650 | 6 | |a Sites Web |x Développement |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer programs |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
758 | |i has work: |a Hacking web apps (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGhJbjDVqqj9hvbTTTxGgX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shema, Mike. |t Hacking web apps. |d Amsterdam ; Boston : Syngress, ©2012 |z 9781597499514 |w (DLC) 2012025821 |w (OCoLC)792877624 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597499514 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24253296 | ||
938 | |a Books 24x7 |b B247 |n bks00047321 | ||
938 | |a ebrary |b EBRY |n ebr10595533 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn809248723 |
---|---|
_version_ | 1816882206225727488 |
adam_text | |
any_adam_object | |
author | Shema, Mike |
author_GND | http://id.loc.gov/authorities/names/no2002079897 |
author_facet | Shema, Mike |
author_role | |
author_sort | Shema, Mike |
author_variant | m s ms |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .S5234 2012 |
callnumber-search | TK5105.59 .S5234 2012 |
callnumber-sort | TK 45105.59 S5234 42012 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. |
ctrlnum | (OCoLC)809248723 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05359cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn809248723</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">120906s2012 mau ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012025821</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">B24X7</subfield><subfield code="d">E7B</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UIU</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LVT</subfield><subfield code="d">K6U</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">UAB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">826867566</subfield><subfield code="a">962188849</subfield><subfield code="a">972036483</subfield><subfield code="a">992094475</subfield><subfield code="a">1037699838</subfield><subfield code="a">1038689086</subfield><subfield code="a">1103262376</subfield><subfield code="a">1129366476</subfield><subfield code="a">1153545524</subfield><subfield code="a">1202548054</subfield><subfield code="a">1240523271</subfield><subfield code="a">1259064088</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499569</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499560</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597499514</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">159749951X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283578824</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283578820</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613891273</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613891274</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)809248723</subfield><subfield code="z">(OCoLC)826867566</subfield><subfield code="z">(OCoLC)962188849</subfield><subfield code="z">(OCoLC)972036483</subfield><subfield code="z">(OCoLC)992094475</subfield><subfield code="z">(OCoLC)1037699838</subfield><subfield code="z">(OCoLC)1038689086</subfield><subfield code="z">(OCoLC)1103262376</subfield><subfield code="z">(OCoLC)1129366476</subfield><subfield code="z">(OCoLC)1153545524</subfield><subfield code="z">(OCoLC)1202548054</subfield><subfield code="z">(OCoLC)1240523271</subfield><subfield code="z">(OCoLC)1259064088</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000190</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">24FC4A48-16E3-4C31-A2CF-F32652230C8D</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S5234 2012</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shema, Mike.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKTQqp8BqgCppCDgPHpyd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2002079897</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking web apps :</subfield><subfield code="b">detecting and preventing web application security problems /</subfield><subfield code="c">Mike Shema.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Waltham, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programs</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web site development</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Développement</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer programs</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Hacking web apps (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGhJbjDVqqj9hvbTTTxGgX</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shema, Mike.</subfield><subfield code="t">Hacking web apps.</subfield><subfield code="d">Amsterdam ; Boston : Syngress, ©2012</subfield><subfield code="z">9781597499514</subfield><subfield code="w">(DLC) 2012025821</subfield><subfield code="w">(OCoLC)792877624</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597499514</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24253296</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00047321</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10595533</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn809248723 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:24:55Z |
institution | BVB |
isbn | 9781597499569 1597499560 1283578824 9781283578820 9786613891273 6613891274 |
language | English |
oclc_num | 809248723 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress, |
record_format | marc |
spelling | Shema, Mike. https://id.oclc.org/worldcat/entity/E39PCjKTQqp8BqgCppCDgPHpyd http://id.loc.gov/authorities/names/no2002079897 Hacking web apps : detecting and preventing web application security problems / Mike Shema. Waltham, MA : Syngress, ©2012. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more. Includes bibliographical references and index. HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. English. Application software Security measures. Computer programs Security measures. Web site development Security measures. Computer crimes Prevention. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels d'application Sécurité Mesures. Logiciels Sécurité Mesures. Sites Web Développement Sécurité Mesures. Sécurité informatique. Computer crimes Prevention fast Computer programs Security measures fast Computer security fast has work: Hacking web apps (Text) https://id.oclc.org/worldcat/entity/E39PCGhJbjDVqqj9hvbTTTxGgX https://id.oclc.org/worldcat/ontology/hasWork Print version: Shema, Mike. Hacking web apps. Amsterdam ; Boston : Syngress, ©2012 9781597499514 (DLC) 2012025821 (OCoLC)792877624 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597499514 Volltext |
spellingShingle | Shema, Mike Hacking web apps : detecting and preventing web application security problems / HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. Application software Security measures. Computer programs Security measures. Web site development Security measures. Computer crimes Prevention. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels d'application Sécurité Mesures. Logiciels Sécurité Mesures. Sites Web Développement Sécurité Mesures. Sécurité informatique. Computer crimes Prevention fast Computer programs Security measures fast Computer security fast |
subject_GND | https://id.nlm.nih.gov/mesh/D016494 |
title | Hacking web apps : detecting and preventing web application security problems / |
title_auth | Hacking web apps : detecting and preventing web application security problems / |
title_exact_search | Hacking web apps : detecting and preventing web application security problems / |
title_full | Hacking web apps : detecting and preventing web application security problems / Mike Shema. |
title_fullStr | Hacking web apps : detecting and preventing web application security problems / Mike Shema. |
title_full_unstemmed | Hacking web apps : detecting and preventing web application security problems / Mike Shema. |
title_short | Hacking web apps : |
title_sort | hacking web apps detecting and preventing web application security problems |
title_sub | detecting and preventing web application security problems / |
topic | Application software Security measures. Computer programs Security measures. Web site development Security measures. Computer crimes Prevention. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels d'application Sécurité Mesures. Logiciels Sécurité Mesures. Sites Web Développement Sécurité Mesures. Sécurité informatique. Computer crimes Prevention fast Computer programs Security measures fast Computer security fast |
topic_facet | Application software Security measures. Computer programs Security measures. Web site development Security measures. Computer crimes Prevention. Computer security. Computer Security Logiciels d'application Sécurité Mesures. Logiciels Sécurité Mesures. Sites Web Développement Sécurité Mesures. Sécurité informatique. Computer crimes Prevention Computer programs Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=478482 https://www.sciencedirect.com/science/book/9781597499514 |
work_keys_str_mv | AT shemamike hackingwebappsdetectingandpreventingwebapplicationsecurityproblems |