Buch, Englisch, 296 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 610 g
Detecting and Preventing Web Application Security Problems
Buch, Englisch, 296 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 610 g
ISBN: 978-1-59749-951-4
Verlag: Syngress
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.
Attacks featured in this book include:
. SQL Injection
. Cross Site Scripting
. Logic Attacks
. Server Misconfigurations
. Predictable Pages
. Web of Distrust
. Breaking Authentication Schemes
. HTML5 Security Breaches
. Attacks on Mobile Apps
Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
Zielgruppe
<p>Information Security professionals of all levels, web application developers, recreational hackers.</p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Webprogrammierung
Weitere Infos & Material
Chapter 1 - Introduction
Chapter 2 - Cross Site Scripting (XSS)
Chapter 3 - Cross Site Request Forgery (CSRF)
Chapter 4 - SQL Injection
Chapter 5 - Server Misconfigurations and Predictable Pages
Chapter 6 - Breaking Authentication Schemes
Chapter 7 - Logic Attacks
Chapter 8 - Web of Distrust
Chapter 9 - HTML5 Security Breaches