It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 02150cam 22003734a 4500
001 9920007970001661
005 20150423123918.0
008 070719s2008 inua 001 0 eng
010 $a 2007029983
020 $a9780470170779 (pbk.)
020 $a0470170778 (pbk.)
035 $a(CSdNU)u310907-01national_inst
035 $a(OCoLC)156994544
035 $a(OCoLC)156994544
035 $a(OCoLC)156994544
040 $aDLC$cDLC$dBAKER$dC#P$dYDXCP$dOrLoB-B
049 $aCNUM
050 00 $aTK5105.875.I57$bS85 2008
082 00 $a005.8$222
100 1 $aStuttard, Dafydd,$d1972-
245 14 $aThe web application hacker's handbook :$bdiscovering and exploiting security flaws /$cDafydd Stuttard, Marcus Pinto.
260 $aIndianapolis, IN :$bWiley Pub.,$cc2008.
300 $axxxii, 736 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aCh. 1. Web Application (In)security -- Ch. 2. Core Defense Mechanisms -- Ch. 3. Web Application Technologies -- Ch. 4. Mapping the Application -- Ch. 5. Bypassing Client-Side Controls -- Ch. 6. Attacking Authentication -- Ch. 7. Attacking Session Management -- Ch. 8. Attacking Access Controls -- Ch. 9. Injecting Code -- Ch. 10. Exploiting Path Traversal -- Ch. 11. Attacking Application Logic -- Ch. 12. Attacking Other Users -- Ch. 13. Automating Bespoke Attacks -- Ch. 14. Exploiting Information Disclosure -- Ch. 15. Attacking Compiled Applications -- Ch. 16. Attacking Application Architecture -- Ch. 17. Attacking the Web Server -- Ch. 18. Finding Vulnerabilities in Source Code -- Ch. 19. A Web Application Hacker's Toolkit -- Ch. 20. A Web Application Hacker's Methodology.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
700 1 $aPinto, Marcus,$d1978-
938 $aBaker & Taylor$bBKTY$c50.00$d37.50$i0470170778$n0007267078$sactive
938 $aYBP Library Services$bYANK$n2604926
947 $fSOET-TEC$hCIRCSTACKS$p$47.50$q1
949 $aTK 5105.875.I57 S85 2008$i31786102213474
994 $a92$bCNU
999 $aTK 5105.875 .I57 S85 2008$wLC$c1$i31786102213474$d11/18/2009 $e10/30/2009$lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u11/28/2007