000 -LEADER |
fixed length control field |
00474nam a2200181Ia 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20181103083652.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
181025s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-81-265-3340-4 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
ENG |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
5.8 |
Item number |
STU/PIN |
Edition number |
DDC23 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stuttard, Dafydd |
245 #0 - TITLE STATEMENT |
Title |
Web application hackers handbook |
250 ## - EDITION STATEMENT |
Edition statement |
2nd |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Susex |
Name of publisher, distributor, etc. |
Wiley International |
Date of publication, distribution, etc. |
2011 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
878 p. |
Other physical details |
| Binding - Paperback | |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. · Introduction · Web Application (In)security · Core Defense Mechanisms · Web Application Technologies · Mapping the Application · Bypassing Client-Side Controls · Attacking Authentication · Attacking Session Management · Attacking Access Controls · Attacking Data Stores · Attacking Back-End Components · Attacking Application Logic · Attacking Users: Cross-Site Scripting · Attacking Users: Other Techniques · Automating Customized Attacks · Exploiting Information Disclosure · Attacking Native Compiled Applications · Attacking Application Architecture · Attacking the Application Server · Finding Vulnerabilities in Source Code · A Web Application Hacker's Toolkit · A Web Application Hacker's Methodology |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4622 |
Topical term or geographic name entry element |
Computer Engineering |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pinto, Marcus |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Text Books |
Source of classification or shelving scheme |
|