Cargando…

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been c...

Descripción completa

Detalles Bibliográficos
Autores principales: Stuttard, Dafydd, Pinto, Marcus
Lenguaje:eng
Publicado: John Wiley & Sons 2011
Materias:
Acceso en línea:http://cds.cern.ch/record/1437504
_version_ 1780924532642545664
author Stuttard, Dafydd
Pinto, Marcus
author_facet Stuttard, Dafydd
Pinto, Marcus
author_sort Stuttard, Dafydd
collection CERN
description The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack technique
id cern-1437504
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
publisher John Wiley & Sons
record_format invenio
spelling cern-14375042021-04-22T00:33:33Zhttp://cds.cern.ch/record/1437504engStuttard, DafyddPinto, MarcusThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsComputing and ComputersThe highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniqueJohn Wiley & Sonsoai:cds.cern.ch:14375042011
spellingShingle Computing and Computers
Stuttard, Dafydd
Pinto, Marcus
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title_full The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title_fullStr The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title_full_unstemmed The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title_short The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
title_sort web application hacker's handbook: finding and exploiting security flaws
topic Computing and Computers
url http://cds.cern.ch/record/1437504
work_keys_str_mv AT stuttarddafydd thewebapplicationhackershandbookfindingandexploitingsecurityflaws
AT pintomarcus thewebapplicationhackershandbookfindingandexploitingsecurityflaws
AT stuttarddafydd webapplicationhackershandbookfindingandexploitingsecurityflaws
AT pintomarcus webapplicationhackershandbookfindingandexploitingsecurityflaws