Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Applications (Hacking Exposed)

Buy
Web Applications (Hacking Exposed), 9780072224382 (007222438X), McGraw-Hill, 2002

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hacker's devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. You'll get in-depth coverage of real-world hacks--both simple and sophisticated--and detailed countermeasures to protect against them.

What you'll learn:

  • The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable platforms and applications
  • How attackers identify potential weaknesses in Web application components
  • What devastating vulnerabilities exist within Web server platforms such as Apache, Microsoft's Internet Information Server (IIS), Netscape Enterprise Server, J2EE, ASP.NET, and more
  • How to survey Web applications for potential vulnerabilities --including checking directory structures, helper files, Java classes and applets, HTML comments, forms, and query strings
  • Attack methods against authentication and session management features such as cookies, hidden tags, and session identifiers
  • Most common input validation attacks--crafted input, command execution characters, and buffer overflows
  • Countermeasures for SQL injection attacks such as robust error handling, custom stored procedures, and proper database configuration
  • XML Web services vulnerabilities and best practices
  • Tools and techniques used to hack Web clients--including cross-site scripting, active content attacks and cookie manipulation
  • Valuable checklists and tips on hardening Web applications and clients based on the authors' consulting experiences
About the Author

Joel Scambray (Lafayette, CA) is a Manager in the Information Systems Audit and Advisory Services practice of Ernst & Young. Joel has over five years experience working with a variety of computer and communications technologies from both an operational and strategic standpoint--ranging from Director of IS for a major commercial real estate firm to Technology Analyst for Info World Magazine.
(HTML tags aren't allowed.)

Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

Make: Technology on Your Time Volume 08
Make: Technology on Your Time Volume 08

If you like to tweak, disassemble, recreate, and invent cool new uses for technology, you'll love MAKE, our project-based quarterly for the inquisitive do-it-yourselfer.

Get ready to play when MAKE Volume 08, our "Toys and Games" issue, hits the stands. You'll learn how to build a wind-up bird that...

Diagnostic Bacteriology Protocols (Methods in Molecular Biology)
Diagnostic Bacteriology Protocols (Methods in Molecular Biology)

The field of bacterial diagnostics has seen unprecedented advances in recent years. The increased need for accurate detection and identification of bacteria in human, animal, food, and environmental samples has fueled the development of new techniques. The field has seen extensive research aided by the information from bacterial genome...


The Rosedale Diet
The Rosedale Diet

Finally—the ultimate diet for fast, safe weight loss, lifelong health, and longer life, based on more than twenty years of research and the latest findings on appetite and weight. Metabolic specialist Ron Rosedale, M.D., has designed the Rosedale Diet to regulate the powerful hormone leptin, which controls appetite and weight loss by...

Normative Externalism
Normative Externalism
Normative Externalism argues that it is not important that people live up to their own principles. What matters, in both ethics and epistemology, is that they live up to the correct principles: that they do the right thing, and that they believe rationally. This stance, that what matters are the correct principles, not one's...
Starting Out with C++: From Control Structures through Objects (7th Edition)
Starting Out with C++: From Control Structures through Objects (7th Edition)
Welcome to Starting Out with C++: From Control Structures through Objects, 7th edition. This book is intended for use in a two-semester C++ programming sequence, or an accelerated one-semester course. Students new to programming, as well as those with prior course work in other languages, will nd this text bene cial. The...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy