Web application hackers handbook
Language: ENG Publication details: Susex Wiley International 2011Edition: 2ndDescription: 878 p. | Binding - Paperback |ISBN:- 978-81-265-3340-4
- 5.8 STU/PIN DDC23
| Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Books
|
School of Engineering & Technology Special Reference (RR) | Reference | 005.8 STU/PIN (Browse shelf(Opens below)) | Not For Loan | E11035 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 STU/PIN (Browse shelf(Opens below)) | Available | E11036 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 STU/PIN (Browse shelf(Opens below)) | Available | E11037 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 STU/PIN (Browse shelf(Opens below)) | Available | E11038 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 STU/PIN (Browse shelf(Opens below)) | Available | E11039 |
Browsing School of Engineering & Technology shelves, Shelving location: Special Reference (RR), Collection: Reference Close shelf browser (Hides shelf browser)
| No cover image available | ||||||||
| 005.1 DOB Software testing and continuous quality improvment | 005.133 KUM Microcontroller programming with Arduino, Scilab, Xcos, Python, Julia and Open Modelica | 005.133 THE Getting started with Python | 005.8 STU/PIN Web application hackers handbook | 006.3 SAR Chatgpt for beginners | 006.31 SHA Machine learning and artificial intelligence in healthcare systems | 307.12 HAB Planning sustainable cities |
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. · Introduction · Web Application (In)security · Core Defense Mechanisms · Web Application Technologies · Mapping the Application · Bypassing Client-Side Controls · Attacking Authentication · Attacking Session Management · Attacking Access Controls · Attacking Data Stores · Attacking Back-End Components · Attacking Application Logic · Attacking Users: Cross-Site Scripting · Attacking Users: Other Techniques · Automating Customized Attacks · Exploiting Information Disclosure · Attacking Native Compiled Applications · Attacking Application Architecture · Attacking the Application Server · Finding Vulnerabilities in Source Code · A Web Application Hacker's Toolkit · A Web Application Hacker's Methodology
There are no comments on this title.