Hacking Web Servicesby Shreeraj Shah
Web Services are an integral part of next generation Web applications. The development and use of these services is growing at an incredible rate, and so too are the security issues surrounding them. Hacking Web Services is a practical guide for understanding Web services security and assessment methodologies. Written for intermediate-to-advanced security… See more details below
Web Services are an integral part of next generation Web applications. The development and use of these services is growing at an incredible rate, and so too are the security issues surrounding them. Hacking Web Services is a practical guide for understanding Web services security and assessment methodologies. Written for intermediate-to-advanced security professionals and developers, the book provides an in-depth look at new concepts and tools used for Web services security. Beginning with a brief introduction to Web services technologies, the book discusses Web services assessment methodology, WSDL an XML format describing Web services as a set of endpoints operating on SOAP messages containing information and the need for secure coding. Various development issues and open source technologies used to secure and harden applications offering Web services are also covered. Throughout the book, detailed case studies, real-life demonstrations, and a variety of tips and techniques are used to teach developers how to write tools for Web services. If you are responsible for securing your company's Web services, this is a must read resource!
Table of Contents
Preface, Section 1: Basics of Web services and security threats; Chapter 1: Evolution of Web applications and the role of Web services; Chapter 2: Web services components; Chapter 3: Threat framework for Web services; Chapter 4: Set of technologies for Web services; Section 2: Web Services Security Assessment (Hacking); Chapter 5: Web services assessment methodology and approaches; Chapter 6: Footprinting, Discover, and Public Search; Chapter 7: Web Services Enumeration, Profiling, and Invoking; Chapter 8: Web Services Attack Vectors and Threats; Section 3: Web Services Security frame work; Chapter 9: Web services defense by deployment on different platforms, Chapter 10: Open source tools and products; Chapter 11: Secure coding for Web services; Chapter 12: Developing tools for Web services attacks and defense; Section 4: Exhibits
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >