000 02415cam a22004937a 4500
001 16878626
003 OSt
005 20220602203307.0
008 110719s2011 inua 001 0 eng d
010 _a 2011934639
015 _aGBB159288
_2bnb
016 7 _a015809108
_2Uk
020 _a9781118026472 (pbk.)
020 _a1118026470 (pbk.)
020 _z9781118175224 (ebk.)
020 _z9781118175248 (ebk.)
020 _z9781118175231 (ebk.)
035 _a(OCoLC)ocn751789928
040 _aUKMGB
_beng
_cUKMGB
_dVP@
_dSINLB
_dORX
_dYDXCP
_dBWX
_dIXA
_dVLB
_dBTCTA
_dDLC
042 _alccopycat
050 0 0 _aTK5105.875.I57
_bS852 2011
082 0 4 _a005.8 STU
_222
092 _20
100 1 _aStuttard, Dafydd,
_d1972-
245 1 4 _aThe web application hacker's handbook :
_bfinding and exploiting security flaws /
_cDafydd Stuttard, Marcus Pinto.
250 _a2nd ed.
260 _aIndianapolis, IN :
_bWiley ;
_aChichester :
_bJohn Wiley [distributor],
_cc2011.
300 _axxxiii, 878 p. :
_bill. ;
_c24 cm.
500 _aPrevious ed.: 2008.
500 _aIncludes index.
505 0 _aWeb application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.
520 _aProvides information on how to discover security flaws in Web applications to defend against hackers.
650 0 _aInternet
_xSecurity measures.
650 0 _aComputer security.
650 7 _aInternet
_xSecurity measures.
_2sears
650 7 _aComputer security.
_2sears
700 1 _aPinto, Marcus,
_d1978-
843 _aPhotocopy
887 _2Photocopy
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_n0
999 _c288
_d288