Web application vulnerabilities: detect, exploit, prevent
"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to f...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, Mass.
Syngress Pub.
2007
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492096/?ar |
Zusammenfassung: | "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) |
ISBN: | 9780080556642 0080556647 9781597492096 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647310 | ||
003 | DE-627-1 | ||
005 | 20240228114338.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780080556642 |c electronic bk. |9 978-0-08-055664-2 | ||
020 | |a 0080556647 |c electronic bk. |9 0-08-055664-7 | ||
020 | |a 9781597492096 |9 978-1-59749-209-6 | ||
035 | |a (DE-627-1)047647310 | ||
035 | |a (DE-599)KEP047647310 | ||
035 | |a (ORHE)9781597492096 | ||
035 | |a (DE-627-1)047647310 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Web application vulnerabilities |b detect, exploit, prevent |c Michael Cross [and others] |
264 | 1 | |a Burlington, Mass. |b Syngress Pub. |c 2007 | |
300 | |a 1 Online-Ressource (1 volume) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Print version record | ||
520 | |a "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket | ||
650 | 0 | |a Application software |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Logiciels d'application ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
700 | 1 | |a Cross, Michael |d 1965- |e VerfasserIn |4 aut | |
776 | 1 | |z 1597492094 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597492094 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492096/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647310 |
---|---|
_version_ | 1821494867589595136 |
adam_text | |
any_adam_object | |
author | Cross, Michael 1965- |
author_facet | Cross, Michael 1965- |
author_role | aut |
author_sort | Cross, Michael 1965- |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647310 (DE-599)KEP047647310 (ORHE)9781597492096 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02353cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047647310</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114338.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556642</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055664-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556647</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055664-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492096</subfield><subfield code="9">978-1-59749-209-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647310</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web application vulnerabilities</subfield><subfield code="b">detect, exploit, prevent</subfield><subfield code="c">Michael Cross [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="d">1965-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597492094</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597492094</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492096/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647310 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9780080556642 0080556647 9781597492096 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Web application vulnerabilities detect, exploit, prevent Michael Cross [and others] Burlington, Mass. Syngress Pub. 2007 1 Online-Ressource (1 volume) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Print version record "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications."--Jacket Application software Security measures Computer security Logiciels d'application ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Cross, Michael 1965- VerfasserIn aut 1597492094 Erscheint auch als Druck-Ausgabe 1597492094 |
spellingShingle | Cross, Michael 1965- Web application vulnerabilities detect, exploit, prevent Application software Security measures Computer security Logiciels d'application ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | Web application vulnerabilities detect, exploit, prevent |
title_auth | Web application vulnerabilities detect, exploit, prevent |
title_exact_search | Web application vulnerabilities detect, exploit, prevent |
title_full | Web application vulnerabilities detect, exploit, prevent Michael Cross [and others] |
title_fullStr | Web application vulnerabilities detect, exploit, prevent Michael Cross [and others] |
title_full_unstemmed | Web application vulnerabilities detect, exploit, prevent Michael Cross [and others] |
title_short | Web application vulnerabilities |
title_sort | web application vulnerabilities detect exploit prevent |
title_sub | detect, exploit, prevent |
topic | Application software Security measures Computer security Logiciels d'application ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | Application software Security measures Computer security Logiciels d'application ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT crossmichael webapplicationvulnerabilitiesdetectexploitprevent |