SFr. 69.00
€ 74.52
BTC 0.0013
LTC 1.011
ETH 0.0259


bestellen

Artikel-Nr. 4474330


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:



Autor(en): 
  • Himanshu Dwivedi
  • Zane Lackey
  • Rich Cannings
  • Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 2 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   Auf Bestellung (Lieferzeit unbekannt)
    Veröffentlichung:  Januar 2008  
    Genre:  EDV / Informatik 
     
    Computers - Computer Security / COMPUTERS / Security / General
    ISBN:  9780071494618 
    EAN-Code: 
    9780071494618 
    Verlag:  McGraw Hill LLC 
    Einband:  Kartoniert  
    Sprache:  English  
    Serie:  Hacking Exposed  
    Dimensionen:  H 230 mm / B 187 mm / D 15 mm 
    Gewicht:  472 gr 
    Seiten:  258 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

    Lock down next-generation Web services

    "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

    Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

    • Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
    • Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
    • Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
    • Circumvent XXE, directory traversal, and buffer overflow exploits
    • Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
    • Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
    • Use input validators and XML classes to reinforce ASP and .NET security
    • Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
    • Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
    • Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks

      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024