HackNotes Web Security Pocket Reference - Brossura

Shema, Mike

 
9780072227840: HackNotes Web Security Pocket Reference

Sinossi

Let consultant, trainer, and author Mike Shema show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to bolster Web application security and secure vulnerable hacking function areas.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit.

Dalla quarta di copertina

HackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted anti-hacking methods, bullet-proof best practices, and code-level techniques. Use the unique Reference Center in the middle of the book to access security commands, input validation checklists, tables for alternate encoding schemes, online resources, SQL injection hints, application testing methodologies, and more.

  • Find critical information in seconds with special 32-page Reference Center insert
  • Configure a secure Web server and develop secure Web applications
  • Learn and understand application scouring and penetration methodologies
  • Protect application data from unauthorized access
  • Create hardened policies, applications, and services
  • Track evidence of application attacks in Web server log files
  • Block platform and Web application vulnerabilities
  • Learn the tools available to handle session hijacking, SQL injection, and more
  • Eliminate common programming pitfalls in ASP, PHP, Java, and Perl
  • Identify Web-based attacks with thorough log analysis

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.