Shema | Seven Deadliest Web Application Attacks | Buch | 978-1-59749-543-1 | sack.de

Buch, Englisch, 192 Seiten, Format (B × H): 191 mm x 233 mm, Gewicht: 405 g

Reihe: Seven Deadliest Attacks

Shema

Seven Deadliest Web Application Attacks


Erscheinungsjahr 2010
ISBN: 978-1-59749-543-1
Verlag: SYNGRESS MEDIA

Buch, Englisch, 192 Seiten, Format (B × H): 191 mm x 233 mm, Gewicht: 405 g

Reihe: Seven Deadliest Attacks

ISBN: 978-1-59749-543-1
Verlag: SYNGRESS MEDIA


Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered.

This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.

Shema Seven Deadliest Web Application Attacks jetzt bestellen!

Zielgruppe


<p>Information security professionals of all levels; web application developers; recreational hackers</p>


Autoren/Hrsg.


Weitere Infos & Material


Introduction Chapter 1. Cross-Site Scripting (XSS) Chapter 2. Cross-Site Request Forgery (CSRF) Chapter 3. SQL Injection Chapter 4. Server Misconfiguration and Predictable Pages Chapter 5. Breaking Authentication Schemes Chapter 6. Logic Attacks Chapter 7. Web of Distrust


Shema, Mike
Mike Shema develops web application security solutions at Qualys, Inc. His current work is focused on an automated web assessment service. Mike previously worked as a security consultant and trainer for Foundstone where he conducted information security assessments across a range of industries and technologies. His security background ranges from network penetration testing, wireless security, code review, and web security. He is the co-author of Hacking Exposed: Web Applications, The Anti-Hacker Toolkit and the author of Hack Notes: Web Application Security. In addition to writing, Mike has presented at security conferences in the U.S., Europe, and Asia.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.