|
|
libcats.org
Web Application Vulnerabilities. Detect, Exploit, PreventSteven PalmerIn this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
· Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more. · See why Cross Site Scripting attacks can be so devastating. · Download working code from the companion Web site.
Популярные книги за неделю:
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Только что пользователи скачали эти книги:
Fusion of Neural Networks, Fuzzy Systems and Genetic AlgoritmАвтор: Lakhmi C. Jain, Автор: N.M. Martin
Размер книги: 6.55 Mb
Mathematical Approaches to Software QualityАвтор: Gerard O'ReganКатегория: Математика, Прикладная математика
Размер книги: 1.33 Mb
A History of Byzantium (Blackwell History of the Ancient World)Автор: Timothy GregoryКатегория: История
Размер книги: 28.75 Mb
Eternal Victory: Triumphal Rulership in Late Antiquity, Byzantium and the Early Medieval West (Past and Present Publications)Автор: Michael McCormickКатегория: История
Размер книги: 50.06 Mb
Byzantium: The Surprising Life of a Medieval EmpireАвтор: Judith HerrinКатегория: История
Размер книги: 6.19 Mb
Subtle Bodies: Representing Angels in Byzantium (The Transformation of the Classical Heritage)Автор: Glenn Peers
Размер книги: 3.51 Mb
|
|
|