Developer's guide to web application security

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Cross, Michael (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, MA Syngress Pub. ©2007
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042314146
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2007 xx o|||| 00||| eng d
020 |a 9781429456470  |c electronic bk.  |9 978-1-4294-5647-0 
020 |a 1429456477  |c electronic bk.  |9 1-4294-5647-7 
020 |a 9781597490610  |9 978-1-59749-061-0 
020 |a 159749061X  |9 1-59749-061-X 
020 |a 0080504094  |9 0-08-050409-4 
020 |a 9780080504094  |9 978-0-08-050409-4 
035 |a (ZDB-33-EBS)ocm85861133 
035 |a (OCoLC)85861133 
035 |a (DE-599)BVBBV042314146 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
100 1 |a Cross, Michael  |e Verfasser  |4 aut 
245 1 0 |a Developer's guide to web application security  |c Michael Cross 
264 1 |a Rockland, MA  |b Syngress Pub.  |c ©2007 
300 |a 1 Online-Ressource (xxii, 489 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Web sites / Security measures  |2 fast 
650 4 |a Computer networks  |x Security measures 
650 4 |a Web sites  |x Security measures 
650 4 |a Computer security 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597490610  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
912 |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027751137 

Datensatz im Suchindex

_version_ 1819294031116500992
any_adam_object
author Cross, Michael
author_facet Cross, Michael
author_role aut
author_sort Cross, Michael
author_variant m c mc
building Verbundindex
bvnumber BV042314146
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (ZDB-33-EBS)ocm85861133
(OCoLC)85861133
(DE-599)BVBBV042314146
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03268nam a2200529zc 4500</leader><controlfield tag="001">BV042314146</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429456470</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-5647-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429456477</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-5647-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490610</subfield><subfield code="9">978-1-59749-061-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749061X</subfield><subfield code="9">1-59749-061-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080504094</subfield><subfield code="9">0-08-050409-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080504094</subfield><subfield code="9">978-0-08-050409-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocm85861133</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85861133</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314146</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Developer's guide to web application security</subfield><subfield code="c">Michael Cross</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 489 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490610</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751137</subfield></datafield></record></collection>
id DE-604.BV042314146
illustrated Not Illustrated
indexdate 2024-12-24T04:19:48Z
institution BVB
isbn 9781429456470
1429456477
9781597490610
159749061X
0080504094
9780080504094
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027751137
oclc_num 85861133
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xxii, 489 pages)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Syngress Pub.
record_format marc
spelling Cross, Michael Verfasser aut
Developer's guide to web application security Michael Cross
Rockland, MA Syngress Pub. ©2007
1 Online-Ressource (xxii, 489 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Web sites / Security measures fast
Computer networks Security measures
Web sites Security measures
Computer security
http://www.sciencedirect.com/science/book/9781597490610 Verlag Volltext
spellingShingle Cross, Michael
Developer's guide to web application security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Web sites / Security measures fast
Computer networks Security measures
Web sites Security measures
Computer security
title Developer's guide to web application security
title_auth Developer's guide to web application security
title_exact_search Developer's guide to web application security
title_full Developer's guide to web application security Michael Cross
title_fullStr Developer's guide to web application security Michael Cross
title_full_unstemmed Developer's guide to web application security Michael Cross
title_short Developer's guide to web application security
title_sort developer s guide to web application security
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Web sites / Security measures fast
Computer networks Security measures
Web sites Security measures
Computer security
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer networks / Security measures
Computer security
Web sites / Security measures
Computer networks Security measures
Web sites Security measures
url http://www.sciencedirect.com/science/book/9781597490610
work_keys_str_mv AT crossmichael developersguidetowebapplicationsecurity