Search the Library Catalogue
000 -LEADER | |
---|---|
fixed length control field | 01675nam a22001937a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250701b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781597495431 |
Paper back/Hardbound | pbk |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.678 |
Item number | SHE |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Mike Shema |
245 ## - TITLE STATEMENT | |
Title | Seven Deadliest Web Application Attacks |
Statement of responsibility, etc | Mike Shema |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Amsterdam |
Name of publisher | Syngress/elsevier Science |
Year of publication | 2010 |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xvi; 146 p. |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index |
520 ## - SUMMARY, ETC. | |
Summary, etc | Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF) SQL Injection Server Misconfiguration and Predictable Pages Breaking Authentication Schemes Logic Attacks Malware and Browser Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer Networks Security Measures Electronic Book Electronic Books Malware (Computer Software) Prevention |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | English Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 08.11.2010 | 004.678 | 350269 | 01.07.2025 | English Books |