Image from Google Jackets

Seven Deadliest Web Application Attacks Mike Shema

By: Language: English Publication details: Amsterdam Syngress/elsevier Science 2010Description: xvi; 146 p. 24 cmISBN:
  • 9781597495431
Subject(s): DDC classification:
  • 004.678 SHE
Summary: Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF) SQL Injection Server Misconfiguration and Predictable Pages Breaking Authentication Schemes Logic Attacks Malware and Browser Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)

Includes index

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF) SQL Injection Server Misconfiguration and Predictable Pages Breaking Authentication Schemes Logic Attacks Malware and Browser Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

There are no comments on this title.

to post a comment.

Find us on the map