Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_657470899
    Format: XXXIII, 878 S. , Ill. , 24 cm
    Edition: 2nd. ed.
    ISBN: 9781118026472 , 1118026470
    Content: Provides information on how to discover security flaws in Web applications to defend against hackers
    Content: Provides information on how to discover security flaws in Web applications to defend against hackers
    Note: Includes index , Web application (in) security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Attacking data stores -- Attacking back-end components -- Attacking application logic -- Attacking users : cross-site scripting -- Attacking users : other techniques -- Automating customized attacks -- Exploiting information disclosure -- Attacking native compiled applications -- Attacking application architecture -- Attacking the application server -- Finding vulnerabilities in source code -- A web application hacker's toolkit -- A web application hacker's methodology.
    Additional Edition: ISBN 9781118175224
    Additional Edition: ISBN 9781118175248
    Additional Edition: ISBN 9781118175231
    Additional Edition: Online-Ausg. Stuttard, Dafydd, 1972 - The web application hacker's handbook Indianapolis : Wiley, 2011 ISBN 9781118175224
    Additional Edition: ISBN 9781118026472
    Additional Edition: Erscheint auch als Online-Ausgabe Stuttard, Dafydd, 1972 - The Web Application Hacker's Handbook Hoboken : Wiley, 2011 ISBN 9781118175224
    Additional Edition: Online-Ausg. bei MyiLibrary Stuttard, Dafydd, 1972 - The web application hacker's handbook Indianapolis, IN : Wiley, 2011 ISBN 9781283258210
    Additional Edition: ISBN 1283258218
    Additional Edition: ISBN 9781118175224
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: World Wide Web ; Anwendungssystem ; Softwareschwachstelle ; Computersicherheit ; Hacker
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages