Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 33,74
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest <Einbetten>
Hacking Exposed Web Applications, Third Edition von [Scambray, Joel, Vincent Liu, Caleb Sima]
Anzeige für Kindle-App

Hacking Exposed Web Applications, Third Edition 3 , Kindle Edition


Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 33,74

April-Aktion: Englische eBooks stark reduziert
Entdecken Sie unsere Auswahl an englischen eBooks aus verschiedenen Genres für je 1,49 EUR. Die aktuelle Aktion läuft noch bis zum 30. April 2017.

Produktbeschreibungen

Kurzbeschreibung

The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.

  • Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster
  • See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation
  • Understand how attackers defeat commonly used Web authentication technologies
  • See how real-world session attacks leak sensitive data and how to fortify your applications
  • Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques
  • Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments
  • Safety deploy XML, social networking, cloud computing, and Web 2.0 services
  • Defend against RIA, Ajax, UGC, and browser-based, client-side exploits
  • Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures

Über den Autor und weitere Mitwirkende

Joel Scambray, CISSP, is co-founder and CEO of Consciere, provider of strategic security advisory services. He has worked in Internet security assessment and defense for nearly 15 years at Microsoft, Foundstone, Ernst & Young, and other organizations. Joel is an internationally renowned speaker and author of multiple security books, including 12 editions in the Hacking Exposed series.

Vincent Liu, CISSP, is a managing partner at Stach & Liu. He previously led the Attack & Penetration and Reverse Engineering teams at Honeywell's Global Security group, was a consultant with the Ernst & Young Advanced Security Centers, and was an analyst at the National Security Agency. Vincent speaks at industry conferences, including Black Hat, ToorCon, and Microsoft's BlueHat.

Caleb Sima is CEO of Armorize Technologies, provider of integrated Web application security solutions. He founded SPI Dynamics, a Web security technology company, and was an early innovator at Internet Security Systems/IBM's elite X-Force team. Caleb presents at key industry conferences, such as RSA and Black Hat.


Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 12294 KB
  • Seitenzahl der Print-Ausgabe: 482 Seiten
  • Gleichzeitige Verwendung von Geräten: Bis zu 4 Geräte gleichzeitig, je nach vom Verlag festgelegter Grenze
  • Verlag: McGraw-Hill Education; Auflage: 3 (22. Oktober 2010)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B004BKIF2K
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
  • Amazon Bestseller-Rang: #470.716 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)
  • Wenn Sie dieses Produkt verkaufen, möchten Sie über Seller Support Updates vorschlagen?


  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.3 von 5 Sternen 12 Rezensionen
3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen really helpful 10. Dezember 2013
Von W. Vogt - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I learned more from this in an hour of sitting and flipping than I have from hours upon hours of searching the web for answers on similar topics. Extremely helpful book for those concerned with web security... covers topics that I've never heard others mention. Also, a lot of people online... specifically with say, PHP programming, will tell you some basic rule or procedure for verifying user input, but they don't explain fully the how and the why---it's like that all over the place---but this book does a very good job of explaining why the procedures and such in PHP or other languages are necessary, and in my case helped me to understand exactly why certain procedures should be employed. (Such as making sure user-submitted data is in the expected encoding, i.e. UTF8, etc.)
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good reference but far from comprehensive 21. Oktober 2014
Von A Guy - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Some of the content is outdated but for the most part it did what I needed it to. I was looking for an intro into Web app vulnerabilities as I begin taking on more responsibility in that at work. I do like the layout as it is easy to understand and it walks me through the use of the various tools well. You can write volumes on each chapter that this book covers so know that this is an overview and you will be happy with the money that you spent on it.
2 von 2 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good book but you need to have fair understanding of ... 13. Dezember 2014
Von Siva Kumar K - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
Good book but you need to have fair understanding of Unix scripting to understand the code of some of the automated scripts that are used in the book and it doesn't mention in the book how those scripts exactly work
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen HACKING EXPOSED BOOKS ARE GREAT!! 1. November 2013
Von Drake! - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
5.0 von 5 Sternen Excellent read! 5. Oktober 2015
Von ISeeRed - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Outstanding! Great layout, tips, tricks, and explanations! As a penetration tester, I recommend this book, paired with the other Hacking Exposed books!
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.
click to open popover