Hacking web apps : detecting and preventing web application security problems /

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike...

Full description

Bibliographic Details
Main Author: Shema, Mike
Corporate Author: ScienceDirect (Online service)
Format: eBook
Language:English
Language Notes:English.
Published: Waltham, MA : Syngress, ©2012.
Subjects:
Online Access:Connect to the full text of this electronic book

MARC

Tag First Indicator Second Indicator Subfields
LEADER 00000cam a2200000 a 4500
001 in00005750413
005 20260326192728.2
006 m o d
007 cr cnu---unuuu
008 120906s2012 mau ob 001 0 eng d
010 |z  2012025821 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d UMI  |d COO  |d B24X7  |d E7B  |d DEBSZ  |d OCLCO  |d OCLCQ  |d UIU  |d TEFOD  |d OCLCQ  |d OCLCO  |d TEFOD  |d OCLCO  |d OCLCQ  |d OCLCO  |d LOA  |d OCLCO  |d LVT  |d K6U  |d AGLDB  |d PIFAG  |d FVL  |d LIV  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d D6H  |d OCLCF  |d STF  |d WRM  |d CEF  |d OCLCQ  |d WYU  |d UAB  |d LEAUB  |d UKAHL  |d VT2  |d UKCRE  |d OCLCQ  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 826867566  |a 962188849  |a 972036483  |a 992094475  |a 1037699838  |a 1038689086  |a 1103262376  |a 1129366476  |a 1153545524  |a 1202548054  |a 1240523271  |a 1259064088 
020 |a 9781597499569  |q (electronic bk.) 
020 |a 1597499560  |q (electronic bk.) 
020 |z 9781597499514 
020 |z 159749951X 
020 |a 1283578824 
020 |a 9781283578820 
020 |a 9786613891273 
020 |a 6613891274 
035 |a (OCoLC)809248723  |z (OCoLC)826867566  |z (OCoLC)962188849  |z (OCoLC)972036483  |z (OCoLC)992094475  |z (OCoLC)1037699838  |z (OCoLC)1038689086  |z (OCoLC)1103262376  |z (OCoLC)1129366476  |z (OCoLC)1153545524  |z (OCoLC)1202548054  |z (OCoLC)1240523271  |z (OCoLC)1259064088 
037 |a CL0500000190  |b Safari Books Online 
037 |a 24FC4A48-16E3-4C31-A2CF-F32652230C8D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .S5234 2012 
082 0 4 |a 005.8  |2 23 
049 |a TXAM 
100 1 |a Shema, Mike.  |1 https://id.oclc.org/worldcat/entity/E39PCjKTQqp8BqgCppCDgPHpyd 
245 1 0 |a Hacking web apps :  |b detecting and preventing web application security problems /  |c Mike Shema. 
260 |a Waltham, MA :  |b Syngress,  |c ©2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more. 
504 |a Includes bibliographical references and index. 
505 0 |a HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. 
546 |a English. 
650 0 |a Application software  |x Security measures. 
650 0 |a Computer programs  |x Security measures. 
650 0 |a Web site development  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Logiciels  |x Sécurité  |x Mesures. 
650 6 |a Sites Web  |x Développement  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer programs  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Electronic books.  |2 local 
710 2 |a ScienceDirect (Online service) 
758 |i has work:  |a Hacking web apps (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGhJbjDVqqj9hvbTTTxGgX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Shema, Mike.  |t Hacking web apps.  |d Amsterdam ; Boston : Syngress, ©2012  |z 9781597499514  |w (DLC) 2012025821  |w (OCoLC)792877624 
856 4 0 |u http://proxy.library.tamu.edu/login?url=https://www.sciencedirect.com/science/book/9781597499514  |z Connect to the full text of this electronic book  |t 0 
955 |a Elsevier ScienceDirect 2026-2027 
955 |a Safari/O'Reilly ebooks 
994 |a 92  |b TXA 
999 f f |i 05dab9cd-79be-4095-9f6f-6f4da4f05dae  |s 21727473-94c3-4543-b061-cb62351958c0  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |s www_evans  |d Available Online  |t 0  |e TK5105.59 .S5234 2012  |h Library of Congress classification 
998 f f |a TK5105.59 .S5234 2012  |t 0  |l Available Online