OWASP top 10:
Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's per...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781836204275/?ar |
Zusammenfassung: | Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's perspective. Next, you'll discover methods to fix these vulnerabilities, implementing robust security measures to protect your applications. Each section concludes with techniques to verify the fixes, ensuring your applications remain secure. Throughout the course, you'll tackle various security issues such as broken access control, cryptographic failures, injection attacks, and insecure design. Each topic is broken down into manageable sections, with dedicated videos for exploiting, fixing, and verifying vulnerabilities. This structured approach ensures you build a solid understanding of each concept before moving on. Designed for web developers, security professionals, and IT specialists, this course requires a basic understanding of web technologies and programming. Whether you're looking to enhance your security skills or secure your organization's applications, this course provides the knowledge and practical skills needed to stay ahead in the ever-evolving field of web security. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) |
Umfang: | 1 Online-Ressource (1 video file (7 hr., 50 min.)) sound, color. |
ISBN: | 9781836204275 1836204272 |
Internformat
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104371056 | ||
003 | DE-627-1 | ||
005 | 20240701091202.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx ||| |o o ||eng c | ||
020 | |a 9781836204275 |c electronic video |9 978-1-83620-427-5 | ||
020 | |a 1836204272 |c electronic video |9 1-83620-427-2 | ||
035 | |a (DE-627-1)104371056 | ||
035 | |a (DE-599)KEP104371056 | ||
035 | |a (ORHE)9781836204275 | ||
035 | |a (DE-627-1)104371056 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.3 |2 23/eng/20240603 | |
245 | 0 | 0 | |a OWASP top 10 |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (7 hr., 50 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) | ||
520 | |a Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's perspective. Next, you'll discover methods to fix these vulnerabilities, implementing robust security measures to protect your applications. Each section concludes with techniques to verify the fixes, ensuring your applications remain secure. Throughout the course, you'll tackle various security issues such as broken access control, cryptographic failures, injection attacks, and insecure design. Each topic is broken down into manageable sections, with dedicated videos for exploiting, fixing, and verifying vulnerabilities. This structured approach ensures you build a solid understanding of each concept before moving on. Designed for web developers, security professionals, and IT specialists, this course requires a basic understanding of web technologies and programming. Whether you're looking to enhance your security skills or secure your organization's applications, this course provides the knowledge and practical skills needed to stay ahead in the ever-evolving field of web security. | ||
650 | 0 | |a Application software |x Security measures | |
650 | 0 | |a Internet of things | |
650 | 4 | |a Logiciels d'application ; Sécurité ; Mesures | |
650 | 4 | |a Internet des objets | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Dennison, Justin |e MitwirkendeR |4 ctb | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781836204275/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104371056 |
---|---|
_version_ | 1831287144835973120 |
adam_text | |
any_adam_object | |
author2 | Dennison, Justin Lowrie, Daniel |
author2_role | ctb ctb |
author2_variant | j d jd d l dl |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Dennison, Justin Lowrie, Daniel ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104371056 (DE-599)KEP104371056 (ORHE)9781836204275 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03156ngm a22005292c 4500</leader><controlfield tag="001">ZDB-30-ORH-104371056</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091202.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781836204275</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83620-427-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1836204272</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83620-427-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104371056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781836204275</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371056</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23/eng/20240603</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">OWASP top 10</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (7 hr., 50 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed June 3, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's perspective. Next, you'll discover methods to fix these vulnerabilities, implementing robust security measures to protect your applications. Each section concludes with techniques to verify the fixes, ensuring your applications remain secure. Throughout the course, you'll tackle various security issues such as broken access control, cryptographic failures, injection attacks, and insecure design. Each topic is broken down into manageable sections, with dedicated videos for exploiting, fixing, and verifying vulnerabilities. This structured approach ensures you build a solid understanding of each concept before moving on. Designed for web developers, security professionals, and IT specialists, this course requires a basic understanding of web technologies and programming. Whether you're looking to enhance your security skills or secure your organization's applications, this course provides the knowledge and practical skills needed to stay ahead in the ever-evolving field of web security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dennison, Justin</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781836204275/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104371056 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:15Z |
institution | BVB |
isbn | 9781836204275 1836204272 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (7 hr., 50 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | OWASP top 10 [First edition]. [Birmingham, United Kingdom] Packt Publishing [2024] 1 Online-Ressource (1 video file (7 hr., 50 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's perspective. Next, you'll discover methods to fix these vulnerabilities, implementing robust security measures to protect your applications. Each section concludes with techniques to verify the fixes, ensuring your applications remain secure. Throughout the course, you'll tackle various security issues such as broken access control, cryptographic failures, injection attacks, and insecure design. Each topic is broken down into manageable sections, with dedicated videos for exploiting, fixing, and verifying vulnerabilities. This structured approach ensures you build a solid understanding of each concept before moving on. Designed for web developers, security professionals, and IT specialists, this course requires a basic understanding of web technologies and programming. Whether you're looking to enhance your security skills or secure your organization's applications, this course provides the knowledge and practical skills needed to stay ahead in the ever-evolving field of web security. Application software Security measures Internet of things Logiciels d'application ; Sécurité ; Mesures Internet des objets Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Dennison, Justin MitwirkendeR ctb Lowrie, Daniel MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | OWASP top 10 Application software Security measures Internet of things Logiciels d'application ; Sécurité ; Mesures Internet des objets Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | OWASP top 10 |
title_auth | OWASP top 10 |
title_exact_search | OWASP top 10 |
title_full | OWASP top 10 |
title_fullStr | OWASP top 10 |
title_full_unstemmed | OWASP top 10 |
title_short | OWASP top 10 |
title_sort | owasp top 10 |
topic | Application software Security measures Internet of things Logiciels d'application ; Sécurité ; Mesures Internet des objets Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Application software Security measures Internet of things Logiciels d'application ; Sécurité ; Mesures Internet des objets Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT dennisonjustin owasptop10 AT lowriedaniel owasptop10 AT acilearningfirm owasptop10 AT packtpublishing owasptop10 |