๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hacking Exposedโ„ข Web applications

โœ Scribed by Joel Scambray, Mike Shema


Publisher
McGraw-Hill/Osborne
Year
2002
Tongue
English
Leaves
416
Series
Hacking Exposed
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hacker's devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. You'll get in-depth coverage of real-world hacks โ€” both simple and sophisticated โ€” and detailed countermeasures to protect against them.

What you'll learn:
โ€ข The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable platforms and applications
โ€ข How attackers identify potential weaknesses in Web application components
โ€ข What devastating vulnerabilities exist within Web server platforms such as Apache, Microsoft's Internet Information Server (IIS), Netscape Enterprise Server, J2EE, ASP.NET, and more
โ€ข How to survey Web applications for potential vulnerabilities โ€” including checking directory structures, helper files, Java classes and applets, HTML comments, forms, and query strings
โ€ข Attack methods against authentication and session management features such as cookies, hidden tags, and session identifiers
โ€ข Most common input validation attacks โ€” crafted input, command execution characters, and buffer overflows
โ€ข Countermeasures for SQL injection attacks such as robust error handling, custom stored procedures, and proper database configuration
โ€ข XML Web services vulnerabilities and best practices
โ€ข Tools and techniques used to hack Web clients โ€” including cross-site scripting, active content attacks and cookie manipulation
โ€ข Valuable checklists and tips on hardening Web applications and clients based on the authors' consulting experiences


๐Ÿ“œ SIMILAR VOLUMES


Hacking Exposed Web Applications
โœ Liu, Vincent;Scambray, Joel;Sima, Caleb ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› McGraw-Hill ๐ŸŒ English

The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications,

Hacking Exposedโ„ข Web applications
โœ Joel Scambray, Mike Shema, Caleb Sima ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› McGraw-Hill ๐ŸŒ English

Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, <em>Hacking Exposed Web App

Hacking Exposed Web Applications: Web Se
โœ Joel Scambray; Mike Shema; Caleb Sima ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› McGraw-Hill/Osborne Media ๐ŸŒ English

This edition has been updated to include new exploitation techniques, the latest denial of service attacks, new phishing scams and leading-edge preventive website development practices.