The web application hacker's handbook finding and exploiting security flaws
"Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it."...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons, Inc.
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 54810 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014835.0 | ||
| 008 | 221104 20112011inua 001 0 eng d | ||
| 020 | |a 9781979868242 | ||
| 020 | |z 978118175224 (ebk) | ||
| 020 | |z 978118175248 (ebk) | ||
| 020 | |z 978118175232 (ebk) | ||
| 039 | 9 | |a 202211041239 |b VLOAD |y 202006230934 |z faezah | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.76.A65 |b S79 2011 | ||
| 100 | 1 | |a Stuttard, Dafydd |d 1972- |e author | |
| 245 | 1 | 4 | |a The web application hacker's handbook |b finding and exploiting security flaws |c Dafydd Stuttard, Marcus Pinto |
| 246 | 3 | |a Finding and exploiting security flaws | |
| 264 | 1 | |a Indianapolis, IN |b John Wiley & Sons, Inc. |c 2011 | |
| 264 | 4 | |c © 2011 | |
| 300 | |a xxxiii, 878 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a v. 1. -- Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Injecting code -- Exploiting path traversal -- v. 2. -- Attacking application logic -- Attacking other users -- Automating bespoke attacks -- Exploiting information disclosure -- Attacking compiled applications -- Attacking application architecture -- Attacking the Web server -- Finding vulnerabilities in source code -- A Web application hacker's toolkit -- A Web application hacker's methodology | |
| 520 | |a "Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it." "This is hands-on stuff. The authors take a practical approach, showing you the steps involved in finding and exploiting security flaws in web applications. You will learn to: defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications; map attack surfaces and recognize potential entry points; break client-side controls implemented within HTML, Java, ActiveX, and Flash; uncover subtle logic flaws that leave applications exposed; use automation to speed up your attacks, with devastating results; and delve into source code and spot common vulnerabilities in language like C#, Java, and PHP." "To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses."--Provided by publisher | ||
| 592 | |a 00013953 |b 21/1/2015 |c RM 359.80 (SET) |h PVK (BL) | ||
| 650 | 0 | |a Application software |x Security measures |v Handbooks, manuals, etc | |
| 650 | 0 | |a Internet |x Security measures |v Handbooks, manuals, etc | |
| 650 | 0 | |a Computer security |v Handbooks, manuals, etc | |
| 700 | 1 | |a Pinto, Marcus |d 1978- |e author | |
| 999 | |a vtls000065627 |c 54810 |d 54810 | ||


