Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Developer's guide to web application...
~
ScienceDirect (Online service)
Linked to FindBook
Google Book
Amazon
博客來
Developer's guide to web application security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Developer's guide to web application security/ Michael Cross.
Author:
Cross, Michael,
Published:
Rockland, MA :Syngress Publishing, : c2007.,
Description:
xxii, 489 p. :ill. ;23 cm.
Notes:
Includes index.
Subject:
Computer networks - Security measures. -
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490610An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.sciencedirect.com/science/book/9781597490610An electronic book accessible through the World Wide Web; click for information
ISBN:
159749061X
Developer's guide to web application security
Cross, Michael,1965-
Developer's guide to web application security
[electronic resource] /Michael Cross. - Rockland, MA :Syngress Publishing,c2007. - xxii, 489 p. :ill. ;23 cm.
Includes index.
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 159749061X
Source: 133658:133783Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.59 / .C767 2007eb
Dewey Class. No.: 005.1
Developer's guide to web application security
LDR
:02899cam 2200301 a 45
001
892983
003
OCoLC
005
20101126
006
m d
007
cr cn|||||||||
008
101126s2007 maua o 001 0 eng d
020
$a
159749061X
020
$a
9781597490610
035
$a
(OCoLC)162131451
035
$a
ocn162131451
037
$a
133658:133783
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.C767 2007eb
082
0 4
$a
005.1
$2
22
100
1
$a
Cross, Michael,
$d
1965-
$3
1000756
245
1 0
$a
Developer's guide to web application security
$h
[electronic resource] /
$c
Michael Cross.
260
$a
Rockland, MA :
$c
c2007.
$b
Syngress Publishing,
300
$a
xxii, 489 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
520
$a
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to
$1
.74 billion by 2007 from
$1
40 million in 2002 * Author Matt Fisher is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
0
$a
Web sites
$x
Security measures.
$3
542677
655
7
$a
Electronic books.
$2
lcsh
$3
542853
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597490610
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9085064
電子資源
11.線上閱覽_V
電子書
EB W9085064
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login