000 02960cam a2200421 i 4500
999 _c14940
_d14940
001 M17882
003 EG-CaMIU
005 20220622121858.0
008 191129t20202020caua f 001 0 eng d
020 _a9781492053118
020 _a1492053112
035 _a(OCoLC)1129100189
040 _aYDX
_beng
_erda
_cYDX
_dBDX
_dCDX
_dOCLCF
_dJRZ
_dEG-CaMIU
050 0 _aTK5105.59
_b.H64 2020
082 0 0 _a005.8
_221
_bH.A. W 2020
090 _a005.8 HOF
100 1 _aHoffman, Andrew J.,
_eauthor.
245 1 0 _aWeb application security :
_bexploitation and countermeasures for modern web applications /
_cAndrew Hoffman.
264 1 _aSebastopol, CA :
_bO'Reilly Media,
_c[2020]
264 4 _c©2020
300 _axxviii, 298 pages :
_billustrations ;
_c23 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index.
505 0 _aThe history of software security -- Introduction to web application reconnaissance -- The structure of a modern web application -- Finding subdomains -- API analysis -- Identifying third-party dependencies -- Identifying weak points in application architecture -- Introduction to hacking web applications -- Cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- XML external entity (XXE) -- Injection -- Denial of service (DoS) -- Exploiting third-party dependencies -- Securing modern web applications -- Secure application architecture -- Reviewing code for security -- Vulnerability discovery -- Vulnerability management -- Defending against XSS attacks -- Defending against CSRF attacks -- Defending against XXE -- Defending against injection -- Defending against DoS -- Securing third-party dependencies -- Conclusion.
520 _aWhile many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking, until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You'll learn methods for effectively researching and analyzing modern web applications, including those you don't have direct access to. You'll also learn how to break into web applications using the latest hacking techniques. Finally, you'll learn how to develop mitigations for use in your own web applications to protect against hackers.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aWorld Wide Web
_xSecurity measures.
650 0 _aApplication software.
942 _2ddc
_cBK
_n005.8 H.A. W 2020
945 _dCCSS
947 _f1BEN
_h1BARCO
_q1
947 _f2UCO
_h2UANF
_q1
947 _f3ARA
_hCDANF
_q1
947 _f3ARA
_hHSANF
_q1
947 _f3ARA
_hSSANF
_q1