Hacking Exposed: Web Applications, McGraw-Hill

Web Application Security Secrets & Solutions

JOEL SCAMBRAY MIKE SHEMA

E-books Shop
Hacking Exposed: Web Applications

"This book would not have existed if not for the support, encouragement, input, and contributions of many entities. We hope we have covered them all here and apologize for any omissions, which are due to our oversight alone."


Contents At a Glace

Part I Reconnaissance
1 Introduction to Web
Applications and Security . . . . . . . . . . 3
2 Profiling . . . . . . . . . . . . . . . . . . . . . . 25
3 Hacking Web Servers . . . . . . . . . . . . . . 41
4 Surveying the Application . . . . . . . . . . . 99
Part II The Attack
5 Authentication . . . . . . . . . . . . . . . . . . . 131
6 Authorization . . . . . . . . . . . . . . . . . . 161
 7 Attacking Session State Management . . . . . 177
8 Input Validation Attacks . . . . . . . . . . . . 201
9 Attacking Web Datastores . . . . . . . . . . . 225
10 Attacking Web Services . . . . . . . . . . . . . 243
11 Hacking Web Application Management . . . 261
12 Web Client Hacking . . . . . . . . . . . . . . . 277
13 Case Studies . . . . . . . . . . . . . . . . . . . 299
Part III Appendixes
 A Web Site Security Checklist . . . . . . . . . . . 311
B Web Hacking Tools and
Techniques Cribsheet . . . . . . . . . . . . . 317
 C Using Libwhisker . . . . . . . . . . . . . . . . 333
 D UrlScan Installation and Configuration . . . . 345
E About the Companion Web Site . . . . . . . . . 371
 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

Screenshot
e-books shop


Purchase Now !
Just with Paypal
●▬▬▬▬❂❂❂▬▬▬▬●

Product details
 Price
 File Size
 7,784 KB
 Pages
 416 p
 File Type
 PDF format
 ISBN
 0-07-222438-X
 Copyright
 2002 by Joel Scambray and Mike Shema 
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post