Language:
English
繁體中文
Help
回圖書館
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Developer's guide to web application...
~
ScienceDirect (Online service)
Developer's guide to web application security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Developer's guide to web application security/ Michael Cross.
Author:
Cross, Michael,
Published:
Rockland, MA :Syngress Publishing, : c2007.,
Description:
xxii, 489 p. :ill. ; : 23 cm.;
Notes:
Includes index.
Subject:
Computer networks - Security measures. -
Online resource:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597490610
Developer's guide to web application security
Cross, Michael,1965-
Developer's guide to web application security
[electronic resource] /Michael Cross. - Rockland, MA :Syngress Publishing,c2007. - xxii, 489 p. :ill. ;23 cm.
Includes index.
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781597490610
Source: 133658:133783Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
86541
Computer networks
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: TK5105.59 / .C767 2007eb
Dewey Class. No.: 005.1
Developer's guide to web application security
LDR
:02984cmm 2200313Ia 4500
001
153177
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2007 maua o 001 0 eng d
020
$a
9781597490610
020
$a
159749061X
035
$a
(OCoLC)162131451
035
$a
ocn162131451
037
$a
133658:133783
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.C767 2007eb
082
0 4
$a
005.1
$2
22
100
1
$a
Cross, Michael,
$d
1965-
$3
291412
245
1 0
$a
Developer's guide to web application security
$h
[electronic resource] /
$c
Michael Cross.
260
$a
Rockland, MA :
$c
c2007.
$b
Syngress Publishing,
300
$a
xxii, 489 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
520
$a
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
$1
.74 billion by 2007 from
$1
40 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
86541
650
0
$a
Web sites
$x
Security measures.
$3
88999
650
0
$a
Computer security.
$3
86565
655
7
$a
Electronic books.
$2
local.
$3
96803
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
159749061X
$z
9781597490610
$w
(OCoLC)82366027
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login