Developer's guide to web application security:
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web applic...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
2007
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490610/?ar |
Zusammenfassung: | Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to USD1.74 billion by 2007 from USD140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (xxii, 489 Seiten) illustrations |
ISBN: | 9781429456470 1429456477 9781597490610 159749061X 0080504094 9780080504094 1281060216 9781281060211 9786611060213 6611060219 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-061576093 | ||
003 | DE-627-1 | ||
005 | 20240228114100.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210216s2007 xx |||||o 00| ||eng c | ||
020 | |a 9781429456470 |c electronic bk. |9 978-1-4294-5647-0 | ||
020 | |a 1429456477 |c electronic bk. |9 1-4294-5647-7 | ||
020 | |a 9781597490610 |9 978-1-59749-061-0 | ||
020 | |a 159749061X |9 1-59749-061-X | ||
020 | |a 0080504094 |9 0-08-050409-4 | ||
020 | |a 9780080504094 |9 978-0-08-050409-4 | ||
020 | |a 1281060216 |9 1-281-06021-6 | ||
020 | |a 9781281060211 |9 978-1-281-06021-1 | ||
020 | |a 9786611060213 |9 9786611060213 | ||
020 | |a 6611060219 |9 6611060219 | ||
035 | |a (DE-627-1)061576093 | ||
035 | |a (DE-599)KEP061576093 | ||
035 | |a (ORHE)9781597490610 | ||
035 | |a (DE-627-1)061576093 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cross, Michael |d 1965- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Developer's guide to web application security |c Michael Cross |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2007 | |
300 | |a 1 Online-Ressource (xxii, 489 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Print version record | ||
520 | |a Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to USD1.74 billion by 2007 from USD140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Web sites |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sites Web ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Web sites ; Security measures | |
776 | 1 | |z 159749061X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 159749061X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490610/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-061576093 |
---|---|
_version_ | 1821494834676891648 |
adam_text | |
any_adam_object | |
author | Cross, Michael 1965- |
author_facet | Cross, Michael 1965- |
author_role | aut |
author_sort | Cross, Michael 1965- |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)061576093 (DE-599)KEP061576093 (ORHE)9781597490610 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03801cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-061576093</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114100.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210216s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429456470</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-5647-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429456477</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-5647-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490610</subfield><subfield code="9">978-1-59749-061-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749061X</subfield><subfield code="9">1-59749-061-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080504094</subfield><subfield code="9">0-08-050409-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080504094</subfield><subfield code="9">978-0-08-050409-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281060216</subfield><subfield code="9">1-281-06021-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281060211</subfield><subfield code="9">978-1-281-06021-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611060213</subfield><subfield code="9">9786611060213</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611060219</subfield><subfield code="9">6611060219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061576093</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP061576093</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490610</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061576093</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="d">1965-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Developer's guide to web application security</subfield><subfield code="c">Michael Cross</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 489 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to USD1.74 billion by 2007 from USD140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sites Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">159749061X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">159749061X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490610/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-061576093 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:41Z |
institution | BVB |
isbn | 9781429456470 1429456477 9781597490610 159749061X 0080504094 9780080504094 1281060216 9781281060211 9786611060213 6611060219 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxii, 489 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Cross, Michael 1965- VerfasserIn aut Developer's guide to web application security Michael Cross Rockland, MA Syngress Pub. 2007 1 Online-Ressource (xxii, 489 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Print version record Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to USD1.74 billion by 2007 from USD140 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book. English. Computer networks Security measures Web sites Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Web sites ; Security measures 159749061X Erscheint auch als Druck-Ausgabe 159749061X |
spellingShingle | Cross, Michael 1965- Developer's guide to web application security Computer networks Security measures Web sites Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Web sites ; Security measures |
title | Developer's guide to web application security |
title_auth | Developer's guide to web application security |
title_exact_search | Developer's guide to web application security |
title_full | Developer's guide to web application security Michael Cross |
title_fullStr | Developer's guide to web application security Michael Cross |
title_full_unstemmed | Developer's guide to web application security Michael Cross |
title_short | Developer's guide to web application security |
title_sort | developer s guide to web application security |
topic | Computer networks Security measures Web sites Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Web sites ; Security measures |
topic_facet | Computer networks Security measures Web sites Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Web sites ; Security measures |
work_keys_str_mv | AT crossmichael developersguidetowebapplicationsecurity |