Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Hacking Exposed Web Applications, Third Edition, Paperback / softback Book

Hacking Exposed Web Applications, Third Edition Paperback / softback

Paperback / softback

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker.

Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures.

Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features.

Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBusterSee new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operationUnderstand how attackers defeat commonly used Web authentication technologiesSee how real-world session attacks leak sensitive data and how to fortify your applicationsLearn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniquesFind and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environmentsSafety deploy XML, social networking, cloud computing, and Web 2.0 servicesDefend against RIA, Ajax, UGC, and browser-based, client-side exploitsImplement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures

Information

Save 16%

£58.99

£49.05

 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information