Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Web application vulnerabilities: detect, exploit, prevent
Bookmark Share

Text

Web application vulnerabilities: detect, exploit, prevent

Cross, Michael - Personal Name; Kapinos, Steven - Personal Name; Meer, Haroon - Personal Name; Muttik, Igor - Personal Name; Palmer, Steve - Personal Name;

Chapter 1: Introduction to web application hacking
Introduction
Web application architecture components
Complex web application software components
Putting it all together
The web application hacking methodology
The history of web application hacking and the evolution of tools

Chapter 2: Information Gathering Techniques
Introduction
The principles of automating searches
Application of data mining
Collecting search terms

Chapter 3: Introduction to server side input validation issues
Introduction
Cross site scripting (XSS)

Chapter 4: Client side exploit frameworks
Introduction
AttackAPI
BeEF
CAL9000
Overview of XSS-Proxy


Chapter 5: Web-based malware
Introduction
Attacks on web
Hacking into web sites
Index hijacking
DNS poisoning (pharming)
Malware and the web: what, where, and how to scan
Parsing and emulating HTML
Browser vulnerabilities
Testing HTTP-scanning solution
Tangled legal web

Chapter 6: Web server and web application testing with BackTrack
Introduction
Approach
Core technology
Open source tools
Case studies: the ttols in action

Chapter 7: Securing web based servaices
Introduction
Web security
Stopping browser exploits
SSL and HTTP/S
Instant messaging
Web-based vulnerabilities
Buffer overflows
Making browsers and email client more security
FTP security
Directory services and LDAP security


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 CRO w
b0001341
Available - Available
Detail Information
Series Title
--
Call Number
005.8 CRO w
Publisher
Massachusetts : Syngress., 2007
Collation
xv, 460 hal.; ilus.; 28 cm
Language
English
ISBN/ISSN
9781597492096
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Application software -- Security measures
Computer security
Specific Detail Info
--
Statement of Responsibility
Michael Cross, et.al
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?