Book by None
"Sinopsis" puede pertenecer a otra edición de este libro.
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.
Hack the planet
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:
Map attack surfaces and recognize potential entry points
Break client-side controls implemented within HTML, Java®, ActiveX®, and Flash®
Uncover subtle logic flaws that leave applications exposed
Use automation to speed up your attacks, with devastating results
Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP
Know your enemy
To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.
Additional resources online at www.wiley.com/go/webhacker
Links to tools and resources
Checklist of tasks involved in attacking applications
Answers to the questions posed in each chapter
A hacking challenge prepared by the authors
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 3,55 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoEUR 3,78 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: More Than Words, Waltham, MA, Estados Unidos de America
Condición: Very Good. . . All orders guaranteed and ship within 24 hours. Before placing your order for please contact us for confirmation on the book's binding. Check out our other listings to add to your order for discounted shipping. Nº de ref. del artículo: WAL-B-3b-001840
Cantidad disponible: 1 disponibles
Librería: Bookmans, Tucson, AZ, Estados Unidos de America
Paperback. Condición: Good. Satisfaction 100% guaranteed. Nº de ref. del artículo: mon0002668073
Cantidad disponible: 1 disponibles
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
Condición: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Nº de ref. del artículo: 5681822-6
Cantidad disponible: 1 disponibles
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
Paperback. Condición: Good. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Nº de ref. del artículo: 0470170778-11-1
Cantidad disponible: 1 disponibles
Librería: Goodwill Books, Hillsboro, OR, Estados Unidos de America
Condición: Good. Signs of wear and consistent use. Nº de ref. del artículo: 3IIUFD0003Q4_ns
Cantidad disponible: 1 disponibles
Librería: SecondSale, Montgomery, IL, Estados Unidos de America
Condición: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00085601866
Cantidad disponible: 1 disponibles
Librería: Goodwill of Silicon Valley, SAN JOSE, CA, Estados Unidos de America
Condición: acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact. Nº de ref. del artículo: GWSVV.0470170778.A
Cantidad disponible: 2 disponibles
Librería: tttkelly1, Fresno, TX, Estados Unidos de America
paperback. Condición: Very Good. Paperback book, Nº de ref. del artículo: 2501150045
Cantidad disponible: 1 disponibles
Librería: MI Re-Tale, Dacula, GA, Estados Unidos de America
Paperback. Condición: Very Good. Very nice book with light wear. Book only. Nº de ref. del artículo: 210421002
Cantidad disponible: 1 disponibles
Librería: Grumpys Fine Books, Tijeras, NM, Estados Unidos de America
Paperback. Condición: very good. little wear and tear. Nº de ref. del artículo: Grumpy0470170778
Cantidad disponible: 1 disponibles