Hacking Web services: [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding]
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boston, Mass.
Charles River Media
c 2007
|
Ausgabe: | 1. ed |
Schriftenreihe: | Networking series
|
Schlagwörter: | |
Links: | http://www.loc.gov/catdir/toc/ecip0614/2006016158.html |
Umfang: | XIV, 338 S. graph. Darst. 24 cm 1 CD-ROM (12 cm) |
Format: | Systemvoraussetzungen der CD-ROM-Beil.: Windows 95/98/NT/2000, Pentium Processor+, CD, hard drive, 64MB RAM, 20MB free disk space. MAC: OS 7.61+, PowerPC, CD, hard drive, 64MB RAM, 20 MB free hard drive space |
ISBN: | 1584504803 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023802043 | ||
003 | DE-604 | ||
005 | 20090426000000.0 | ||
007 | t| | ||
008 | 071009s2007 xx d||| |||| 00||| eng d | ||
020 | |a 1584504803 |9 1-584-50480-3 | ||
035 | |a (OCoLC)728098909 | ||
035 | |a (DE-599)BVBBV023802043 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Shah, Shreeraj |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking Web services |b [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] |c Shreeraj Shah |
250 | |a 1. ed | ||
264 | 1 | |a Boston, Mass. |b Charles River Media |c c 2007 | |
300 | |a XIV, 338 S. |b graph. Darst. |c 24 cm |e 1 CD-ROM (12 cm) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Networking series | |
538 | |a Systemvoraussetzungen der CD-ROM-Beil.: Windows 95/98/NT/2000, Pentium Processor+, CD, hard drive, 64MB RAM, 20MB free disk space. MAC: OS 7.61+, PowerPC, CD, hard drive, 64MB RAM, 20 MB free hard drive space | ||
650 | 0 | 7 | |a Web Services |0 (DE-588)4691234-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Web Services |0 (DE-588)4691234-4 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0614/2006016158.html |3 Inhaltsverzeichnis | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017444242 |
Datensatz im Suchindex
_version_ | 1818966534748372992 |
---|---|
any_adam_object | |
author | Shah, Shreeraj |
author_facet | Shah, Shreeraj |
author_role | aut |
author_sort | Shah, Shreeraj |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV023802043 |
ctrlnum | (OCoLC)728098909 (DE-599)BVBBV023802043 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01741nam a2200373zc 4500</leader><controlfield tag="001">BV023802043</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090426000000.0</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">071009s2007 xx d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1584504803</subfield><subfield code="9">1-584-50480-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)728098909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023802043</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shah, Shreeraj</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking Web services</subfield><subfield code="b">[gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding]</subfield><subfield code="c">Shreeraj Shah</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Charles River Media</subfield><subfield code="c">c 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 338 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield><subfield code="e">1 CD-ROM (12 cm)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Networking series</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Systemvoraussetzungen der CD-ROM-Beil.: Windows 95/98/NT/2000, Pentium Processor+, CD, hard drive, 64MB RAM, 20MB free disk space. MAC: OS 7.61+, PowerPC, CD, hard drive, 64MB RAM, 20 MB free hard drive space</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0614/2006016158.html</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017444242</subfield></datafield></record></collection> |
id | DE-604.BV023802043 |
illustrated | Illustrated |
indexdate | 2024-12-20T13:34:26Z |
institution | BVB |
isbn | 1584504803 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017444242 |
oclc_num | 728098909 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | XIV, 338 S. graph. Darst. 24 cm 1 CD-ROM (12 cm) |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Charles River Media |
record_format | marc |
series2 | Networking series |
spelling | Shah, Shreeraj Verfasser aut Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] Shreeraj Shah 1. ed Boston, Mass. Charles River Media c 2007 XIV, 338 S. graph. Darst. 24 cm 1 CD-ROM (12 cm) txt rdacontent n rdamedia nc rdacarrier Networking series Systemvoraussetzungen der CD-ROM-Beil.: Windows 95/98/NT/2000, Pentium Processor+, CD, hard drive, 64MB RAM, 20MB free disk space. MAC: OS 7.61+, PowerPC, CD, hard drive, 64MB RAM, 20 MB free hard drive space Web Services (DE-588)4691234-4 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Web Services (DE-588)4691234-4 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 http://www.loc.gov/catdir/toc/ecip0614/2006016158.html Inhaltsverzeichnis |
spellingShingle | Shah, Shreeraj Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] Web Services (DE-588)4691234-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4691234-4 (DE-588)4293034-0 |
title | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] |
title_auth | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] |
title_exact_search | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] |
title_full | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] Shreeraj Shah |
title_fullStr | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] Shreeraj Shah |
title_full_unstemmed | Hacking Web services [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] Shreeraj Shah |
title_short | Hacking Web services |
title_sort | hacking web services gives security professionals developers and administrators a detailed reference to web services security isues mathodologies and defense strategies provides step by step approach for web services sucurity assessment with both blackbox and whitebox approaches includes methods for defending corporate web services with content filtering and secure coding |
title_sub | [gives security professionals, developers, and administrators a detailed reference to Web services security isues, mathodologies, and defense strategies ; provides step-by-step approach for Web services sucurity assessment with both blackbox and whitebox approaches ; includes methods for defending corporate Web services with content filtering and secure coding] |
topic | Web Services (DE-588)4691234-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Web Services Zugriffskontrolle |
url | http://www.loc.gov/catdir/toc/ecip0614/2006016158.html |
work_keys_str_mv | AT shahshreeraj hackingwebservicesgivessecurityprofessionalsdevelopersandadministratorsadetailedreferencetowebservicessecurityisuesmathodologiesanddefensestrategiesprovidesstepbystepapproachforwebservicessucurityassessmentwithbothblackboxandwhiteboxapproachesincludesmeth |