Since its early days as an information exchange tool limited to academe, researchers, and the military, the web has grown into a commerce engine that is now omnipresent in all facets of our lifes. More websites are created daily and more applications are developed to allow users to learn, research,
How to break Web software: functional and security testing of Web applications and Web services
β Scribed by Andrews, Mike;Whittaker, James A
- Publisher
- Addison-Wesley
- Year
- 2010
- Tongue
- English
- Leaves
- 240
- Edition
- 8. print
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Preface viiAcknowledgments ixAbout the Authors xi Chapter 1: The Web Is Different 1Chapter 2: Gathering Information on the Target 11Chapter 3: Attacking the Client 29Chapter 4: State-Based Attacks 41Chapter 5: Attacking User-Supplied Input Data 65Chapter 6: Language-Based Attacks 85Chapter 7: Attacking the Server 99Chapter 8: Authentication 115Chapter 9: Privacy 135Chapter 10: Web Services 149 Appendix A: Fifty Years of Software: Key Principles for Quality 159Appendix B: Flowershop Bugs 171Appendix C: Tools 179 Index 207
β¦ Subjects
Computersicherheit;Datensicherung;Software;Web Services;World Wide Web
π SIMILAR VOLUMES
Since its early days as an information exchange tool limited to academe, researchers, and the military, the web has grown into a commerce engine that is now omnipresent in all facets of our lifes. More websites are created daily and more applications are developed to allow users to learn, research,
<p>The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information systems, web services, and web interoperability; obtaining a common understanding of verification needs in web applications; achieving a common un
* Covers security basics and guides reader through the process of testing a Web site. * Explains how to analyze results and design specialized follow-up tests that focus on potential security gaps. * Teaches the process of discovery, scanning, analyzing, verifying results of specialized tests, and f
<p>Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just donβt touch a front end or a back end; todayβs web apps impact just about every corner of it. Todayβs web apps have become complex, which has made them a prime target for sophistica
<p>Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just donβt touch a front end or a back end; todayβs web apps impact just about every corner of it. Todayβs web apps have become complex, which has made them a prime target for sophistica