Hacking Web Apps

Hacking Web Apps
Author: Mike Shema
Publisher: Newnes
Total Pages: 298
Release: 2012-08-29
Genre: Computers
ISBN: 159749951X


Download Hacking Web Apps Book in PDF, Epub and Kindle

HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks.


Hacking Web Apps
Language: en
Pages: 298
Authors: Mike Shema
Categories: Computers
Type: BOOK - Published: 2012-08-29 - Publisher: Newnes

GET EBOOK

HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication
Hacking Web Apps
Language: en
Pages: 295
Authors: Mike Shema
Categories: Computers
Type: BOOK - Published: 2012-10-22 - Publisher: Newnes

GET EBOOK

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content f
The Web Application Hacker's Handbook
Language: en
Pages: 770
Authors: Dafydd Stuttard
Categories: Computers
Type: BOOK - Published: 2011-03-16 - Publisher: John Wiley & Sons

GET EBOOK

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-w
The Basics of Web Hacking
Language: en
Pages: 160
Authors: Josh Pauli
Categories: Computers
Type: BOOK - Published: 2013-06-18 - Publisher: Elsevier

GET EBOOK

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is ne
Web Application Defender's Cookbook
Language: en
Pages: 563
Authors: Ryan C. Barnett
Categories: Computers
Type: BOOK - Published: 2013-01-04 - Publisher: John Wiley & Sons

GET EBOOK

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify a