𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Testing and Securing Web Applications

✍ Scribed by Ravi Das (Author); Greg Johnson (Author)


Publisher
Auerbach Publications
Year
2020
Leaves
224
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur.

The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas:

  • Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone).
  • Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission.
  • Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation.
  • Threat hunting: Thisuses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps.
  • The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim.

Testing and Securing Web Applicationsbreaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

✦ Table of Contents


Chapter 1. Network Security.

Chapter 2. Cryptography

Chapter 3. Penetration Testing

Chapter 4. Threat Hunting

Chapter 5. Conclusion


πŸ“œ SIMILAR VOLUMES


Testing and Securing Web Applications
✍ Ravi Das πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<p>Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophistica

Testing Web Security: Assessing the Secu
✍ Steven Splaine πŸ“‚ Library πŸ“… 2002 πŸ› Wiley 🌐 English

* Covers security basics and guides reader through the process of testing a Web site. * Explains how to analyze results and design specialized follow-up tests that focus on potential security gaps. * Teaches the process of discovery, scanning, analyzing, verifying results of specialized tests, and f

How to break Web software: functional an
✍ Andrews, Mike;Whittaker, James A πŸ“‚ Library πŸ“… 2006;2010 πŸ› Addison Wesley 🌐 English

Since its early days as an information exchange tool limited to academe, researchers, and the military, the web has grown into a commerce engine that is now omnipresent in all facets of our lifes. More websites are created daily and more applications are developed to allow users to learn, research,

How to Break Web Software: Functional an
✍ Mike Andrews, James A. Whittaker πŸ“‚ Library πŸ“… 2006 πŸ› Addison-Wesley Professional 🌐 English

Since its early days as an information exchange tool limited to academe, researchers, and the military, the web has grown into a commerce engine that is now omnipresent in all facets of our lifes. More websites are created daily and more applications are developed to allow users to learn, research,

Practical Web Penetration Testing: Secur
✍ Gus Khawaja πŸ“‚ Library πŸ“… 2018 πŸ› Packt Publishing 🌐 English

<p><b>Learn how to execute web application penetration testing end-to-end</b></p><h4>Key Features</h4><ul><li>Build an end-to-end threat model landscape for web application security</li><li>Learn both web application vulnerabilities and web intrusion testing</li><li>Associate network vulnerabilities