Hacking Exposed (TM) Web Applications

Hacking Exposed (TM) Web Applications

4.5 2
by Joel Scambray, David Wong, Mike Shema, Joel Sambray
     
 
Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web

Overview

Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web application security.

"Required reading for Web architects and operators." — Erik Olson, Microsoft Program Manager, Security, ASP.NET

"Just as the original Hacking Exposed revealed the techniques the bad guys were hiding behind, Hacking Exposed Web Applications will do the same for this critical technology. Its methodical approach and appropriate detail will enlighten, educate, and go a long way toward making the Web a safer place in which to do business." — from the Foreword by Mark Curphey, Chair of the Open Web Application Security Project

"This is a serious technical guide that is also great reading — scary enough to motivate folks to take Web security seriously but approachable enough to be an effective learning tool. Required reading for Web architects and operators." — Erik Olson, Program Manager, Security, ASP.NET

"What better way to defend against hackers than to understand the tools and techniques that are used to penetrate your site? Hacking Exposed Web Applications offers a detailed look at common vulnerabilities within your applications and explains how to protect yourself from them." — Mike Mullins, Ecommerce Security Engineer for a leading specialty apparel retailer

"At last, your personal guide to preventing the next generation of security threats. This book explains in intricate detail how you can do everything right when it comes to network security and still be owned at the Web application layer." — Chip Andrews, www.sqlsecurity.com

"If you're involved in writing Web-based applications using ASP/ASP.NET, Java, JSP, PHP, or other languages, the Hacking Exposed series is something you DEFINITELY need to read. Before writing one line of code, this book will spark ideas about how to design and secure your Web applications. There are techniques potential hackers could use that I've never even thought of! Great resource!" — Steve Schofield, Creator and Managing Editor, ASPFree.com

Editorial Reviews

Step-by-step instructions are given for defending against Web-based attacks in this book exposing the hacker's methods and thought processes. The book explains how intruders gather information, acquire targets, gain control, and cover their tracks, and describes real- world hacking incidents and countermeasures. Sixty pages of reference appendices provide checklists and instructions for using security software. Scambray is co-author of a previous book on hacking. Shema is a consultant, author, and technical editor to . Annotation c. Book News, Inc., Portland, OR (booknews.com)

Product Details

ISBN-13:
9780072224382
Publisher:
McGraw-Hill Companies, The
Publication date:
06/01/1902
Series:
Hacking Exposed Series
Pages:
600
Product dimensions:
7.36(w) x 9.16(h) x 1.08(d)

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Hacking Exposed Web Applications 4.5 out of 5 based on 0 ratings. 2 reviews.
Anonymous More than 1 year ago
Guest More than 1 year ago
Sink into the mind of those looking to break into your systems. The author suggests tools, often freely available, to find the problems in a system which place it at risk and evaluates those tools critically. Know what the hackers know. Evaluate your risks so you can patch or redesign your web site to reduce your the risks to a minimum.