logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Hacking Exposed™ Web applications by Joel Scambray, Mike Shema ISBN 9780072224382, 007222438X

  • SKU: EBN-982108
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

18 reviews
Instant download (eBook) Hacking Exposed™ Web applications after payment.
Authors:Joel Scambray, Mike Shema
Pages:416 pages.
Year:2002
Editon:1
Publisher:McGraw-Hill/Osborne
Language:english
File Size:7.6 MB
Format:pdf
ISBNS:9780072224382, 007222438X
Categories: Ebooks

Product desciption

(Ebook) Hacking Exposed™ Web applications by Joel Scambray, Mike Shema ISBN 9780072224382, 007222438X

Unleash the hackers' arsenal to secure your Web applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hacker's devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. You'll get in-depth coverage of real-world hacks — both simple and sophisticated — and detailed countermeasures to protect against them.
What you'll learn:
• The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable platforms and applications
• How attackers identify potential weaknesses in Web application components
• What devastating vulnerabilities exist within Web server platforms such as Apache, Microsoft's Internet Information Server (IIS), Netscape Enterprise Server, J2EE, ASP.NET, and more
• How to survey Web applications for potential vulnerabilities — including checking directory structures, helper files, Java classes and applets, HTML comments, forms, and query strings
• Attack methods against authentication and session management features such as cookies, hidden tags, and session identifiers
• Most common input validation attacks — crafted input, command execution characters, and buffer overflows
• Countermeasures for SQL injection attacks such as robust error handling, custom stored procedures, and proper database configuration
• XML Web services vulnerabilities and best practices
• Tools and techniques used to hack Web clients — including cross-site scripting, active content attacks and cookie manipulation
• Valuable checklists and tips on hardening Web applications and clients based on the authors' consulting experiences
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products