Hacking the code: ASP.NET web application security
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previo...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
© 2004
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781932266658 http://www.sciencedirect.com/science/book/9781932266658 |
Zusammenfassung: | Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. * Learn to quickly create security tools that ease the burden of software testing and network administration * Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development * Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools * Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications * Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits |
Beschreibung: | Includes index |
Umfang: | 1 online resource (xxiii, 447 pages) illustrations |
ISBN: | 1931836434 9781931836432 9781932266658 1932266658 9780080478173 0080478174 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124569 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2004 xx a||| o|||| 00||| eng d | ||
020 | |a 1931836434 |9 1-931836-43-4 | ||
020 | |a 9781931836432 |9 978-1-931836-43-2 | ||
020 | |a 9781932266658 |9 978-1-932266-65-8 | ||
020 | |a 1932266658 |9 1-932266-65-8 | ||
020 | |a 9780080478173 |9 978-0-08-047817-3 | ||
020 | |a 0080478174 |9 0-08-047817-4 | ||
035 | |a (ZDB-33-ESD)ocm55499515 | ||
035 | |a (OCoLC)55499515 | ||
035 | |a (DE-599)BVBBV046124569 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.276 |2 22 | |
100 | 1 | |a Burnett, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking the code |b ASP.NET web application security |c Mark Burnett, James C. Foster, technical ed |
246 | 1 | 3 | |a ASP.NET web application security |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c © 2004 | |
300 | |a 1 online resource (xxiii, 447 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. * Learn to quickly create security tools that ease the burden of software testing and network administration * Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development * Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools * Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications * Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits | ||
630 | 0 | 4 | |a Active server pages |x Security measures |
650 | 7 | |a Active server pages |2 fast | |
650 | 7 | |a REFERENCE / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Security systems |2 fast | |
650 | 4 | |a Application software |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a ASP.NET |0 (DE-588)4678758-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a ASP.NET |0 (DE-588)4678758-6 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Foster, James C. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781932266658 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
347 | |a data file |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031505023 | |
966 | e | |u http://www.sciencedirect.com/science/book/9781932266658 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818985991628652544 |
---|---|
any_adam_object | |
author | Burnett, Mark |
author_facet | Burnett, Mark |
author_role | aut |
author_sort | Burnett, Mark |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV046124569 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm55499515 (OCoLC)55499515 (DE-599)BVBBV046124569 |
dewey-full | 005.276 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.276 |
dewey-search | 005.276 |
dewey-sort | 15.276 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03906nam a2200577zc 4500</leader><controlfield tag="001">BV046124569</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2004 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836434</subfield><subfield code="9">1-931836-43-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836432</subfield><subfield code="9">978-1-931836-43-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266658</subfield><subfield code="9">978-1-932266-65-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266658</subfield><subfield code="9">1-932266-65-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478173</subfield><subfield code="9">978-0-08-047817-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478174</subfield><subfield code="9">0-08-047817-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm55499515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55499515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124569</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.276</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Burnett, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking the code</subfield><subfield code="b">ASP.NET web application security</subfield><subfield code="c">Mark Burnett, James C. Foster, technical ed</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">ASP.NET web application security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiii, 447 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. * Learn to quickly create security tools that ease the burden of software testing and network administration * Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development * Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools * Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications * Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Active server pages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Active server pages</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">REFERENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">ASP.NET</subfield><subfield code="0">(DE-588)4678758-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">ASP.NET</subfield><subfield code="0">(DE-588)4678758-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781932266658</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505023</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781932266658</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124569 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:43:42Z |
institution | BVB |
isbn | 1931836434 9781931836432 9781932266658 1932266658 9780080478173 0080478174 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505023 |
oclc_num | 55499515 |
open_access_boolean | |
physical | 1 online resource (xxiii, 447 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Burnett, Mark Verfasser aut Hacking the code ASP.NET web application security Mark Burnett, James C. Foster, technical ed ASP.NET web application security Rockland, MA Syngress Pub. © 2004 1 online resource (xxiii, 447 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. * Learn to quickly create security tools that ease the burden of software testing and network administration * Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development * Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools * Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications * Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits Active server pages Security measures Active server pages fast REFERENCE / General bisacsh Computer networks / Security measures fast Security systems fast Application software Security measures Computer networks Security measures ASP.NET (DE-588)4678758-6 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf ASP.NET (DE-588)4678758-6 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Foster, James C. Sonstige oth http://www.sciencedirect.com/science/book/9781932266658 Verlag URL des Erstveröffentlichers Volltext data file rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Burnett, Mark Hacking the code ASP.NET web application security Active server pages Security measures Active server pages fast REFERENCE / General bisacsh Computer networks / Security measures fast Security systems fast Application software Security measures Computer networks Security measures ASP.NET (DE-588)4678758-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4678758-6 (DE-588)4274324-2 |
title | Hacking the code ASP.NET web application security |
title_alt | ASP.NET web application security |
title_auth | Hacking the code ASP.NET web application security |
title_exact_search | Hacking the code ASP.NET web application security |
title_full | Hacking the code ASP.NET web application security Mark Burnett, James C. Foster, technical ed |
title_fullStr | Hacking the code ASP.NET web application security Mark Burnett, James C. Foster, technical ed |
title_full_unstemmed | Hacking the code ASP.NET web application security Mark Burnett, James C. Foster, technical ed |
title_short | Hacking the code |
title_sort | hacking the code asp net web application security |
title_sub | ASP.NET web application security |
topic | Active server pages Security measures Active server pages fast REFERENCE / General bisacsh Computer networks / Security measures fast Security systems fast Application software Security measures Computer networks Security measures ASP.NET (DE-588)4678758-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Active server pages Security measures Active server pages REFERENCE / General Computer networks / Security measures Security systems Application software Security measures Computer networks Security measures ASP.NET Computersicherheit |
url | http://www.sciencedirect.com/science/book/9781932266658 |
work_keys_str_mv | AT burnettmark hackingthecodeaspnetwebapplicationsecurity AT fosterjamesc hackingthecodeaspnetwebapplicationsecurity AT burnettmark aspnetwebapplicationsecurity AT fosterjamesc aspnetwebapplicationsecurity |