語系:
繁體中文
English
說明(常見問題)
回圖書館
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Developer's guide to web application...
~
ScienceDirect (Online service)
Developer's guide to web application security
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Developer's guide to web application security/ Michael Cross.
作者:
Cross, Michael,
出版者:
Rockland, MA :Syngress Publishing, : c2007.,
面頁冊數:
xxii, 489 p. :ill. ; : 23 cm.;
附註:
Includes index.
標題:
Computer networks - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597490610
Developer's guide to web application security
Cross, Michael,1965-
Developer's guide to web application security
[electronic resource] /Michael Cross. - Rockland, MA :Syngress Publishing,c2007. - xxii, 489 p. :ill. ;23 cm.
Includes index.
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781597490610
Source: 133658:133783Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
86541
Computer networks
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: TK5105.59 / .C767 2007eb
Dewey Class. No.: 005.1
Developer's guide to web application security
LDR
:02984cmm 2200313Ia 4500
001
153177
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2007 maua o 001 0 eng d
020
$a
9781597490610
020
$a
159749061X
035
$a
(OCoLC)162131451
035
$a
ocn162131451
037
$a
133658:133783
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.C767 2007eb
082
0 4
$a
005.1
$2
22
100
1
$a
Cross, Michael,
$d
1965-
$3
291412
245
1 0
$a
Developer's guide to web application security
$h
[electronic resource] /
$c
Michael Cross.
260
$a
Rockland, MA :
$c
c2007.
$b
Syngress Publishing,
300
$a
xxii, 489 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
520
$a
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
$1
.74 billion by 2007 from
$1
40 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
86541
650
0
$a
Web sites
$x
Security measures.
$3
88999
650
0
$a
Computer security.
$3
86565
655
7
$a
Electronic books.
$2
local.
$3
96803
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
159749061X
$z
9781597490610
$w
(OCoLC)82366027
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入