Normal view MARC view ISBD view

Web application hackers handbook

By: Stuttard, Dafydd.
Contributor(s): Pinto, Marcus.
Publisher: Susex Wiley International 2011Edition: 2nd.Description: 878 p. | Binding - Paperback |.ISBN: 978-81-265-3340-4.Subject(s): Computer EngineeringDDC classification: 5.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
 Text Books Text Books School of Engineering & Technology
Special Reference (RR)
Reference 005.8 STU/PIN (Browse shelf) Not For Loan E11035
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 STU/PIN (Browse shelf) Available E11036
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 STU/PIN (Browse shelf) Available E11037
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 STU/PIN (Browse shelf) Available E11038
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 STU/PIN (Browse shelf) Available E11039
Total holds: 0
Browsing School of Engineering & Technology Shelves , Shelving location: Special Reference (RR) , Collection code: Reference Close shelf browser
004.66076 HIN/OBE CCNA data center 004.66076 KOC CCIE routing and switching v5.1 foundations 004.678 LAM CCNA Routing and switching complete study guide 005.8 STU/PIN Web application hackers handbook 333.7005 MAI Handbook of methods in environmental studies 333.7005 MAI Handbook of methods in environmental studies 363.72876 LAG/BUC Hazardous waste management

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. · Introduction · Web Application (In)security · Core Defense Mechanisms · Web Application Technologies · Mapping the Application · Bypassing Client-Side Controls · Attacking Authentication · Attacking Session Management · Attacking Access Controls · Attacking Data Stores · Attacking Back-End Components · Attacking Application Logic · Attacking Users: Cross-Site Scripting · Attacking Users: Other Techniques · Automating Customized Attacks · Exploiting Information Disclosure · Attacking Native Compiled Applications · Attacking Application Architecture · Attacking the Application Server · Finding Vulnerabilities in Source Code · A Web Application Hacker's Toolkit · A Web Application Hacker's Methodology

There are no comments for this item.

Log in to your account to post a comment.
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha