Foto 1 di 1

Galleria
Foto 1 di 1

Ne hai uno da vendere?
H*cking Web Apps: Detecting and Preventing Web , Shema.=
US $57,94
CircaEUR 49,57
Condizione:
Nuovo
Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o danneggiate. Per maggiori dettagli, consulta l'inserzione del venditore.
3 disponibili
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: MD, Stati Uniti
Consegna:
Consegna prevista tra il sab 2 ago e il ven 15 ago a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:333724585364
Specifiche dell'oggetto
- Condizione
- PublishedOn
- 2012-10-04
- Title
- H*cking Web Apps: Detecting and Preventing Web Application Secur
- Artist
- Not Specified
- ISBN
- 9781597499514
Informazioni su questo prodotto
Product Identifiers
Publisher
Elsevier Science & Technology Books
ISBN-10
159749951X
ISBN-13
9781597499514
eBay Product ID (ePID)
11038420682
Product Key Features
Number of Pages
296 Pages
Language
English
Publication Name
Hacking Web Apps : Detecting and Preventing Web Application Security Problems
Subject
Internet / General, Security / General, General
Publication Year
2012
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2012-025821
Reviews
"Preventing and fixing vulnerabilities is what this book is really about...The truth is that it's most appropriate for anyone tasked with securing an organisation's website. However, all web developers should be made to read it, whether they consider themselves coders or designers."--Network Security Newsletter, July 2013 "This book is equally valuable to technical security practitioners and less-technical security leaders alike. I recommend anyone looking to develop their own web applications or defend against modern web application exploitation take advantage of Mike Shema's expertise on this topic."--Doug Steelman, Chief Information Security Officer, Dell SecureWorks "Hacking Web Apps by Mike Shema introduces novice security practitioners to the most threatening exploits plaguing modern web applications. The book covers more than the raw concepts, by bringing in other vulnerabilities and showing how the various exploits relate to one another; and it does so in human readable terms."--Robert Hansen, CEO of Falling Rock Networks and SecTheory Ltd., "This book is equally valuable to technical security practitioners and less-technical security leaders alike. I recommend anyone looking to develop their own web applications or defend against modern web application exploitation take advantage of Mike Shema's expertise on this topic." -Doug Steelman, Chief Information Security Officer, Dell SecureWorks "Hacking Web Apps by Mike Shema introduces novice security practitioners to the most threatening exploits plaguing modern web applications. The book covers more than the raw concepts, by bringing in other vulnerabilities and showing how the various exploits relate to one another; and it does so in human readable terms." -Robert Hansen, CEO of Falling Rock Networks and SecTheory Ltd., "This book is equally valuable to technical security practitioners and less-technical security leaders alike. I recommend anyone looking to develop their own web applications or defend against modern web application exploitation take advantage of Mike Shema's expertise on this topic." -Doug Steelman, Chief Information Security Officer, Dell SecureWorks "Hacking Web Apps by Mike Shema introduces novice security practitioners to the most threatening exploits plaguing modern web applications. The book covers more than the raw concepts, by bringing in other vulnerabilities and showing how the various exploits relate to one another; and it does so in human readable terms." -Robert Hansen, CEO of Falling Rock Networks and SecTheory Ltd., "This book is equally valuable to technical security practitioners and less-technical security leaders alike. Recommend anyone looking to develop their own web applications or defend against modern web application exploitation take advantage of Mike Shema's expertise on this topic." -Doug Steelman, Chief Information Security Officer, Dell SecureWorks "Hacking Web Apps by Mike Shema introduces novice security practitioners to the most threatening exploits plaguing modern web applications. The book covers more than the raw concepts, by bringing in other vulnerabilities and showing how the various exploits relate to one another; and it does so in human readable terms." -Robert Hansen, CEO of Falling Rock Networks and SecTheory Ltd., "Preventing and fixing vulnerabilities is what this book is really about.The truth is that it's most appropriate for anyone tasked with securing an organisation's website. However, all web developers should be made to read it, whether they consider themselves coders or designers."--Network Security Newsletter, July 2013 "This book is equally valuable to technical security practitioners and less-technical security leaders alike. I recommend anyone looking to develop their own web applications or defend against modern web application exploitation take advantage of Mike Shema's expertise on this topic."--Doug Steelman, Chief Information Security Officer, Dell SecureWorks "Hacking Web Apps by Mike Shema introduces novice security practitioners to the most threatening exploits plaguing modern web applications. The book covers more than the raw concepts, by bringing in other vulnerabilities and showing how the various exploits relate to one another; and it does so in human readable terms."--Robert Hansen, CEO of Falling Rock Networks and SecTheory Ltd.
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1 - Introduction Chapter 2 - Cross Site Scripting (XSS) Chapter 3 - Cross Site Request Forgery (CSRF) Chapter 4 - SQL Injection Chapter 5 - Server Misconfigurations and Predictable Pages Chapter 6 - Breaking Authentication Schemes Chapter 7 - Logic Attacks Chapter 8 - Web of Distrust Chapter 9 - HTML5 Security Breaches
Synopsis
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: - SQL Injection - Cross Site Scripting - Logic Attacks - Server Misconfigurations - Predictable Pages - Web of Distrust - Breaking Authentication Schemes - HTML5 Security Breaches - Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked--as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure., How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: - SQL Injection - Cross Site Scripting - Logic Attacks - Server Misconfigurations - Predictable Pages - Web of Distrust - Breaking Authentication Schemes - HTML5 Security Breaches - Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked--as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more., How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: * SQL Injection * Cross Site Scripting * Logic Attacks * Server Misconfigurations * Predictable Pages * Web of Distrust * Breaking Authentication Schemes * HTML5 Security Breaches * Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked--as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
LC Classification Number
TK5105.59
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Partita IVA: GB 724498118
CRN: 03800600
Informazioni su sicurezza e accessibilità
Informazioni su questo venditore
Awesomebooksusa
98% di Feedback positivi•1,3 milioni oggetti venduti
Registrato come venditore professionale
Categorie più popolari di questo Negozio
Feedback sul venditore (542.578)
- f***f (1583)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoExcellent Seller, Goes the Extra Mile. The Seller Was Incredibly Communicative. Smooth Transaction, Shipped Very Quickly, As Advertised; Good Price; Well Packaged & Delivered Within a Few Days. Item in Described Promised Condition, Thank You Very Much!!!!!!!!!!! A+
- c***c (222)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoMy book arrived in good condition. Packaging was a rigid cardboard mailer, and it protected my book well. It was shipped in a reasonable amount of time, but I was still prompted to reach out to inquire further about it. Seller communication was very good, answering me within 24-hours. I was told shipping can take 9-15 days to happen... it arrived within 10 days after purchase. I would purchase from this seller again. Two thumbs up!
- z***i (1159)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoI recently purchased a book from this Seller, and I couldn't be more pleased with the entire experience. The book arrived in excellent condition, exactly as described. It was packaged in a sturdy, reusable cardboard envelope using no plastic at all. Delivery was surprisingly fast, exceeding my expectations. I highly recommend this Seller!The Wombat Who Talked to the Stars By Jill Morris (N° 335855773715)