Hacking Exposed (TM) Web Applications

Overview

Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web application security.

"Required reading for Web architects and operators." — Erik Olson, Microsoft Program Manager, Security, ASP.NET

"Just as the original ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (24) from $1.99   
  • New (3) from $33.49   
  • Used (21) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$33.49
Seller since 2014

Feedback rating:

(267)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$45.00
Seller since 2014

Feedback rating:

(151)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$45.00
Seller since 2014

Feedback rating:

(151)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web application security.

"Required reading for Web architects and operators." — Erik Olson, Microsoft Program Manager, Security, ASP.NET

"Just as the original Hacking Exposed revealed the techniques the bad guys were hiding behind, Hacking Exposed Web Applications will do the same for this critical technology. Its methodical approach and appropriate detail will enlighten, educate, and go a long way toward making the Web a safer place in which to do business." — from the Foreword by Mark Curphey, Chair of the Open Web Application Security Project

"This is a serious technical guide that is also great reading — scary enough to motivate folks to take Web security seriously but approachable enough to be an effective learning tool. Required reading for Web architects and operators." — Erik Olson, Program Manager, Security, ASP.NET

"What better way to defend against hackers than to understand the tools and techniques that are used to penetrate your site? Hacking Exposed Web Applications offers a detailed look at common vulnerabilities within your applications and explains how to protect yourself from them." — Mike Mullins, Ecommerce Security Engineer for a leading specialty apparel retailer

"At last, your personal guide to preventing the next generation of security threats. This book explains in intricate detail how you can do everything right when it comes to network security and still be owned at the Web application layer." — Chip Andrews, www.sqlsecurity.com

"If you're involved in writing Web-based applications using ASP/ASP.NET, Java, JSP, PHP, or other languages, the Hacking Exposed series is something you DEFINITELY need to read. Before writing one line of code, this book will spark ideas about how to design and secure your Web applications. There are techniques potential hackers could use that I've never even thought of! Great resource!" — Steve Schofield, Creator and Managing Editor, ASPFree.com

Read More Show Less

Editorial Reviews

From The Critics
Step-by-step instructions are given for defending against Web-based attacks in this book exposing the hacker's methods and thought processes. The book explains how intruders gather information, acquire targets, gain control, and cover their tracks, and describes real- world hacking incidents and countermeasures. Sixty pages of reference appendices provide checklists and instructions for using security software. Scambray is co-author of a previous book on hacking. Shema is a consultant, author, and technical editor to . Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780072224382
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 6/1/1902
  • Series: Hacking Exposed Series
  • Pages: 600
  • Product dimensions: 7.36 (w) x 9.16 (h) x 1.08 (d)

Table of Contents

Foreword
Acknowledgements
Preface
1 Introduction to Web Applications and Security 3
2 Profiling 25
3 Hacking Web Servers 41
4 Surveying the Application 99
5 Authentication 131
6 Authorization 161
7 Attacking Session State Management 177
8 Input Validation Attacks 201
9 Attacking Web Datastores 225
10 Attacking Web Services 243
11 Hacking Web Application Management 261
12 Web Client Hacking 277
13 Case Studies 299
A Web Site Security Checklist 311
B Web Hacking Tools and Techniques Cribsheet 317
C Using Libwhisker 333
D UrlScan Installation and Configuration 345
E: About the Companion Web Site 371
Index 373
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 7 Customer Reviews
  • Anonymous

    Posted March 6, 2003

    Think Like The Hackers

    Sink into the mind of those looking to break into your systems. The author suggests tools, often freely available, to find the problems in a system which place it at risk and evaluates those tools critically. Know what the hackers know. Evaluate your risks so you can patch or redesign your web site to reduce your the risks to a minimum.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 15, 2001

    Amazing Book

    This is very 'warez' book I've ever read. The coolest way for hacking and protecting your awsome server.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 11, 2001

    THE BEST BOOK EVER

    This is the best book for people who wish to become hackers or for people who want to be safe from them. This is a real good it is worth every penny a MUST BUY! What are you waiting for buy this book and be safe! You may think your safe but your not wait until you buy this book and see how safe you will be!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 20, 2001

    G@@D B@@K

    i think this book was reALLY GOOD IT SHOWED ME HOW TO KEEP MY COMPUTER SAFE FROM HACKERS AND CRACKERS !!! THANKS A BUNCH REAL GOOD BOOK

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 7, 2001

    great book for wannabe hackers and for webmasters

    This is a great book that teaches the reader not only how to hack a certain vulnerbility, but also how to fix it so it doesn't happen to you. The second edition is great, better than the first. It includes a whole new chapter, 'Hacking the Internet User,' and win2k exploits.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 26, 2000

    Even better than the first

    The first edition was a great book, explaining how people use trojans and different scripts to break into networks, but this one is even better. It not only has better coverage of things from the first book, it includes great exploits for Win2k

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 7, 2010

    No text was provided for this review.

Sort by: Showing all of 7 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)