Local cover image
Local cover image

The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, IN : Wiley ; Chichester : John Wiley [distributor], c2011.Edition: 2nd edDescription: xxxiii, 878 p. : ill. ; 24 cmISBN:
  • 9781118026472 (pbk.)
  • 1118026470 (pbk.)
Subject(s): DDC classification:
  • 005.8 STU  22
LOC classification:
  • TK5105.875.I57 S852 2011
Contents:
Web application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.
Summary: Provides information on how to discover security flaws in Web applications to defend against hackers.
List(s) this item appears in: STEM & ENGINEERING CORNER
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books CamTech Library STEM & Engineering 005.8 STU (Browse shelf(Opens below)) 1 Available CamTech 000257

Previous ed.: 2008.

Includes index.

Web application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.

Provides information on how to discover security flaws in Web applications to defend against hackers.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image