Web Application Vulnerabilities: Detect, Exploit, Prevent - Steven Palmer
- Format: Non Precisé Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre84,94 €
Produit Neuf
Ou 21,24 € /mois
- Livraison à 0,01 €
- Livré entre le 26 mai et le 2 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781597492096_dbm
Nos autres offres
-
111,43 €
Produit Neuf
Ou 27,86 € /mois
- Livraison : 25,00 €
- Livré entre le 8 et le 13 juin
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Web Application Vulnerabilities: Detect, Exploit, Prevent de Steven Palmer Format Non Precisé - Livre Informatique
0 avis sur Web Application Vulnerabilities: Detect, Exploit, Prevent de Steven Palmer Format Non Precisé - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Structure Et Interpretation Des Programmes Informatiques
2 avis
Occasion dès 76,32 €
-
La Bible Super Nintendo
5 avis
Occasion dès 50,00 €
-
The Elder Scrolls V, Skyrim - Peuples Et Créatures
6 avis
Occasion dès 69,00 €
-
Certified Ethical Hacker - Préparation À La Certification Ceh
Neuf dès 59,00 €
-
Le Renseignement Offensif
1 avis
Occasion dès 52,87 €
-
Traitement De Donnees Complexes Et Commandes En Logique Floue
Neuf dès 88,00 €
-
Cahier D'activités Arduino Pour Les Kids
Occasion dès 58,18 €
-
Electrotechnique
6 avis
Neuf dès 84,90 €
Occasion dès 50,89 €
-
Les Haut-Parleurs
3 avis
Occasion dès 64,89 €
-
L'électronique En Pratique - Tome 2
1 avis
Occasion dès 49,00 €
-
Neo Geo Anthologie - Gold Edition
Occasion dès 59,90 €
-
Approche Logique De L'intelligence Artificielle Tome 3 - Du Traitement De La Langue À La Logique Des Systèmes Experts
Occasion dès 45,00 €
-
Systèmes D'exploitation
Occasion dès 79,90 €
-
Joueur Du Grenier (Le) - Fan Book - Tome 1 : Saison 1
6 avis
Occasion dès 89,99 €
-
Final Fantasy 8 Viii - Le Guide Officiel
48 avis
Occasion dès 72,67 €
-
Ingénierie De L'ia
2 avis
Neuf dès 49,95 €
Occasion dès 47,45 €
-
Apprendre Lightroom Classic Cc Lr - Découvrez Comment Gérer Votre Lux De Travail, Organiser Votre Bibliothèque, Retoucher Et Partager Vos Photos
2 avis
Occasion dès 47,00 €
-
Algorithmique - Cours Avec 957 Exercices Et 158 Problèmes
2 avis
Occasion dès 61,44 €
-
Corriges Des Exercices Et Tp Du Traite De L'electronique - Volume 1, Electronique Analogique
Occasion dès 114,90 €
-
Grands Noms Du Jeu Vidéo (Les) - Tome 3 : Gunpei Yokoi: Vie Et Philosophie Du Dieu Des Jouets Nintendo
2 avis
Occasion dès 84,90 €
Produits similaires
Présentation Web Application Vulnerabilities: Detect, Exploit, Prevent de Steven Palmer Format Non Precisé
- Livre Informatique
Résumé :
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications....
Biographie:
Steve has 16 years of experience in the information technology industry. Steve has worked for several very successful security boutiques as an ethical hacker. Steve has found hundreds of previously undiscovered critical vulnerabilities in a wide variety of products and applications for a wide variety of clients. Steve has performed security assessments and penetration tests for clients in many diverse industries and government agencies. He has performed security assessments for companies in many different verticals such as the entertainment, oil, energy, pharmaceutical, engineering, automotive, aerospace, insurance, computer & network security, medical, and financial & banking industries. Steve has also performed security assessments for government agencies such as the Department of Interior, Department of Treasury, Department of Justice, Department of Interior, as well as the Intelligence Community. Steve's findings have lead to the entire Department of Interior being disconnected from the Internet. Prior to being a security consultant Steve worked as a System Administrator, administering firewalls, UNIX systems, and databases for the Department of Defense, Department of Treasury, and the Department of Justice. Prior to that, Steve served 6 years in the United States Navy as an Electronics Technician. Steve has also written several security tools which have yet to be released publicly. Steve is also a member of the FBI's Infragard organization....
Sommaire:
Chapter 1: Introduction
Chapter 2: Information Gathering Techniques
Chapter 3: Common Input Validation Vulnerabilities
Chapter 4: Application Logic Flaws and Common Coding Issues
Chapter 5: Common Client Trust Issues
Chapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role Environment
Chapter 7: Session Management Vulnerabilities
Chapter 8: Phishing
Chapter 9: Client Side Security
Chapter 10: Same Issues / New Technologies
Chapter 11: Other Security Considerations...
Détails de conformité du produit
Personne responsable dans l'UE