Hacking web apps detecting and preventing web application security problems
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic A...
Saved in:
| Main Author: | Shema, Mike |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam ; Boston
Syngress
c2012.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Web application vunerabilities Detect, exploit,prevent
by: Palmer
Published: (2007)
by: Palmer
Published: (2007)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Securing Web services practical usage of standards and specifications
Published: (2008)
Published: (2008)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Web security sourcebook
by: Rubin
Published: (1997)
by: Rubin
Published: (1997)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012)
by: Ganguly, Debashis
Published: (2012)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Intrusion detection a machine learning approach
by: Yu, Zhenwei
Published: (2011)
by: Yu, Zhenwei
Published: (2011)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009)
by: Ashbaugh
Published: (2009)
Guide to firewall and network security with instruction detection and VPNs
Published: (2009)
Published: (2009)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
How to cheat at securing your network
Published: (2007)
Published: (2007)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Computer security and penetration testing
by: Basta, Alfred
Published: (2008)
by: Basta, Alfred
Published: (2008)
Network security know it all
Published: (2008)
Published: (2008)
Network security first step
by: Thomas ,Tom
Published: (2004)
by: Thomas ,Tom
Published: (2004)
Network security current status and future directions
by: Douligeris
Published: (2007)
by: Douligeris
Published: (2007)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
How to break Web software functional and security testing of Web applications and Web services
by: Andrews, Mike
Published: (2006)
by: Andrews, Mike
Published: (2006)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Guide to network defense and countermeasures
by: Weaver
Published: (2007)
by: Weaver
Published: (2007)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
How to cheat at configuring open source security tools
Published: (2007)
Published: (2007)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Web application design patterns
by: Vora, Pawan
Published: (2009)
by: Vora, Pawan
Published: (2009)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Protect Yourself Online IcMatthew Danda
by: Danda lhMatthew
by: Danda lhMatthew
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
Build your own security lab a field guide for network testing
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
Applied security visualization
by: Marty, Raffael 1976-
Published: (2009)
by: Marty, Raffael 1976-
Published: (2009)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
Similar Items
-
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011) -
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013) -
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008) -
Web application vunerabilities Detect, exploit,prevent
by: Palmer
Published: (2007) -
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)


