Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven PalmerWeb Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer

Web Application Vulnerabilities: Detect, Exploit, Prevent

bySteven PalmerEditorSteven Palmer

Paperback | December 14, 2007

Pricing and Purchase Info

$87.22 online 
$92.50 list price save 5%
Earn 436 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.

  • Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
  • See why Cross Site Scripting attacks can be so devastating.
Steve has 16 years of experience in the information technology industry. Steve has worked for several very successful security boutiques as an ethical hacker. Steve has found hundreds of previously undiscovered critical vulnerabilities in a wide variety of products and applications for a wide variety of clients. Steve has performed sec...
Loading
Title:Web Application Vulnerabilities: Detect, Exploit, PreventFormat:PaperbackDimensions:480 pages, 9.25 × 7.5 × 0.68 inPublished:December 14, 2007Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1597492094

ISBN - 13:9781597492096

Look for similar items by category:

Reviews

Table of Contents

Chapter 1: Introduction
Chapter 2: Information Gathering Techniques
Chapter 3: Common Input Validation Vulnerabilities
Chapter 4: Application Logic Flaws and Common Coding Issues
Chapter 5: Common Client Trust Issues
Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment
Chapter 7: Session Management Vulnerabilities
Chapter 8: Phishing
Chapter 9: Client Side Security
Chapter 10: Same Issues / New Technologies
Chapter 11: Other Security Considerations