logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Developer's Guide to Web Application Security by Michael Cross ISBN 9781429456470, 9781597490610, 1429456477, 159749061X

  • SKU: EBN-921528
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.3

6 reviews
Instant download (eBook) Developer's Guide to Web Application Security after payment.
Authors:Michael Cross
Pages:513 pages.
Year:2007
Editon:1
Publisher:Syngress
Language:english
File Size:10.91 MB
Format:pdf
ISBNS:9781429456470, 9781597490610, 1429456477, 159749061X
Categories: Ebooks

Product desciption

(Ebook) Developer's Guide to Web Application Security by Michael Cross ISBN 9781429456470, 9781597490610, 1429456477, 159749061X

75% of attacks targeted against specific systems are aimed against the web application itself; not the operating system or network. While current security technologies and practices are aimed for the operating system and network, the custom developed software that runs the web application is the most exposed portion of any website, and often the most vulnerable. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products