رکورد قبلیرکورد بعدی

" Web application vulnerabilities : "


Document Type : BL
Record Number : 962905
Doc. No : b717275
Title & Author : Web application vulnerabilities : : detect, exploit, prevent /\ Michael Cross [and others].
Publication Statement : Burlington, Mass. :: Syngress Pub.,, ©2007.
Page. NO : 1 online resource (1 volume)
ISBN : 0080556647
: : 9780080556642
: 1597492094
: 9781597492096
Bibliographies/Indexes : Includes index.
Contents : Ch. 1. Introduction to Web Application Hacking -- Ch. 2. Information Gathering Techniques -- Ch. 3. Introduction to Server Side Input Validation Issues -- Ch. 4. Client-Side Exploit Frameworks -- Ch. 5. Web-Based Malware -- Ch. 6. Web Server and Web Application Testing with BackTrack -- Ch. 7. Securing Web Based Services.
Abstract : "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket.
Subject : Application software-- Security measures.
Subject : Computer security.
Subject : Computer security.
Subject : COMPUTERS-- Internet-- Security.
Subject : COMPUTERS-- Networking-- Security.
Subject : COMPUTERS-- Security-- General.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.76.A65‬‭W428 2007eb‬
Added Entry : Cross, Michael,1965-
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟