More of a programmer's guide than a security guide, Hacking the Code explains how certain code can be attacked, shows how you should edit the code, and offers case studies and examples for doing so. The book establishes policies for object input, and shows how to audit existing code for potential se
Hacking the Code: ASP.NET Web Application Security
โ Scribed by Mark Burnett
- Book ID
- 127457845
- Publisher
- Syngress
- Year
- 2004
- Tongue
- English
- Weight
- 5 MB
- Edition
- 1
- Category
- Library
- ISBN-13
- 9781932266726
No coin nor oath required. For personal study only.
โฆ Synopsis
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. * Learn to quickly create security tools that ease the burden of software testing and network administration * Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development * Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools * Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications * Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits
๐ SIMILAR VOLUMES
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Prev
This title presents a scenario-based approach to designing and building secure applications that are based on ASP.NET technology. It identifies exactly where and how developers should perform authentication and authorization, and it demonstrates both how and when to use security techniques in establ
Programming Data-Driven Web Applications with ASP.NET provides readers with a solid understanding of ASP.NET and how to effectively integrate databases with their Web sites. The key to making information instantly available on the Web is integrating the Web site and the database to work as one piece
Learn how to create the basic, dynamic, and advanced ASP.NET pages in C# Packed with tips, tricks, and workarounds, this book covers every aspect of developing a Web application for the enterprise using ASP.NET and C#. Written by Microsoft insiders, it shows readers how to create the basic, dynamic,
Learn the strategies that developers at Microsoft use to build great ASP.NET applications-and get their sample programs! This in-depth insider's guide shares the hard-won, hard-core coding experience of the Microsoft ASP.NET development team, revealing the most productive ways to exploit ASP.NET fea