Hacking web apps detecting and preventing web application security problems

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Shema, Mike (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Waltham, MA Syngress c2012
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042305236
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2012 xx o|||| 00||| eng d
020 |a 9781597499514  |9 978-1-59749-951-4 
020 |a 159749951X  |9 1-59749-951-X 
020 |a 9781597499569  |9 978-1-59749-956-9 
020 |a 1597499560  |9 1-59749-956-0 
035 |a (ZDB-33-EBS)ocn809248723 
035 |a (OCoLC)809248723 
035 |a (DE-599)BVBBV042305236 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 23 
100 1 |a Shema, Mike  |e Verfasser  |4 aut 
245 1 0 |a Hacking web apps  |b detecting and preventing web application security problems  |c Mike Shema 
264 1 |a Waltham, MA  |b Syngress  |c c2012 
300 |a 1 Online-Ressource (1 online resource) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more 
500 |a Includes bibliographical references and index 
650 7 |a Computer networks / Security measures  |2 local 
650 7 |a Web applications / Security measures  |2 local 
650 7 |a Web site development / Security measures  |2 local 
650 7 |a Computer security  |2 local 
650 7 |a Computer crimes / Prevention  |2 local 
650 4 |a Application software  |x Security measures 
650 4 |a Computer programs  |x Security measures 
650 4 |a Web site development  |x Security measures 
650 4 |a Computer crimes  |x Prevention 
650 4 |a Computer security 
653 |a Electronic books 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597499514  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
912 |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027742228 

Datensatz im Suchindex

_version_ 1819294008059363328
any_adam_object
author Shema, Mike
author_facet Shema, Mike
author_role aut
author_sort Shema, Mike
author_variant m s ms
building Verbundindex
bvnumber BV042305236
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (ZDB-33-EBS)ocn809248723
(OCoLC)809248723
(DE-599)BVBBV042305236
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03470nam a2200541zc 4500</leader><controlfield tag="001">BV042305236</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499514</subfield><subfield code="9">978-1-59749-951-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749951X</subfield><subfield code="9">1-59749-951-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499569</subfield><subfield code="9">978-1-59749-956-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499560</subfield><subfield code="9">1-59749-956-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn809248723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)809248723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shema, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking web apps</subfield><subfield code="b">detecting and preventing web application security problems</subfield><subfield code="c">Mike Shema</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web applications / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web site development / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web site development</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499514</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742228</subfield></datafield></record></collection>
id DE-604.BV042305236
illustrated Not Illustrated
indexdate 2024-12-24T04:19:29Z
institution BVB
isbn 9781597499514
159749951X
9781597499569
1597499560
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027742228
oclc_num 809248723
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (1 online resource)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Syngress
record_format marc
spelling Shema, Mike Verfasser aut
Hacking web apps detecting and preventing web application security problems Mike Shema
Waltham, MA Syngress c2012
1 Online-Ressource (1 online resource)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more
Includes bibliographical references and index
Computer networks / Security measures local
Web applications / Security measures local
Web site development / Security measures local
Computer security local
Computer crimes / Prevention local
Application software Security measures
Computer programs Security measures
Web site development Security measures
Computer crimes Prevention
Computer security
Electronic books
http://www.sciencedirect.com/science/book/9781597499514 Verlag Volltext
spellingShingle Shema, Mike
Hacking web apps detecting and preventing web application security problems
Computer networks / Security measures local
Web applications / Security measures local
Web site development / Security measures local
Computer security local
Computer crimes / Prevention local
Application software Security measures
Computer programs Security measures
Web site development Security measures
Computer crimes Prevention
Computer security
title Hacking web apps detecting and preventing web application security problems
title_auth Hacking web apps detecting and preventing web application security problems
title_exact_search Hacking web apps detecting and preventing web application security problems
title_full Hacking web apps detecting and preventing web application security problems Mike Shema
title_fullStr Hacking web apps detecting and preventing web application security problems Mike Shema
title_full_unstemmed Hacking web apps detecting and preventing web application security problems Mike Shema
title_short Hacking web apps
title_sort hacking web apps detecting and preventing web application security problems
title_sub detecting and preventing web application security problems
topic Computer networks / Security measures local
Web applications / Security measures local
Web site development / Security measures local
Computer security local
Computer crimes / Prevention local
Application software Security measures
Computer programs Security measures
Web site development Security measures
Computer crimes Prevention
Computer security
topic_facet Computer networks / Security measures
Web applications / Security measures
Web site development / Security measures
Computer security
Computer crimes / Prevention
Application software Security measures
Computer programs Security measures
Web site development Security measures
Computer crimes Prevention
url http://www.sciencedirect.com/science/book/9781597499514
work_keys_str_mv AT shemamike hackingwebappsdetectingandpreventingwebapplicationsecurityproblems