Record:   Prev Next
Author Cross, Michael
Title Developer's Guide to Web Application Security
Imprint Rockland : Elsevier Science & Technology Books, 2007
©2007
book jacket
Descript 1 online resource (513 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Front Cover -- Developer's Guide to Web Application Security -- Copyright Page -- Contents -- Chapter 1. Hacking Methodology -- Introduction -- A Brief History of Hacking -- What Motivates a Hacker? -- Understanding Current Attack Types -- Recognizing Web Application Security Threats -- Preventing Break-Ins by Thinking like a Hacker -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. How to Avoid Becoming a Code Grinder -- Introduction -- What Is a Code Grinder? -- Thinking Creatively when Coding -- Security from the Perspective of a Code Grinder -- Building Functional and Secure Web Applications -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Understanding the Risk Associated with Mobile Code -- Introduction -- Recognizing the Impact of Mobile Code Attacks -- Identifying Common Forms of Mobile Code -- Protecting Your System from Mobile Code Attacks -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Vulnerable CGI Scripts -- Introduction -- What Is a CGI Script, and What Does It Do? -- Break-Ins Resulting from Weak CGI Scripts -- Languages for Writing CGI Scripts -- Advantages of Using CGI Scripts -- Rules for Writing Secure CGI Scripts -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Hacking Techniques and Tools -- Introduction -- A Hacker's Goals -- The Five Phases of Hacking -- Defacing Web Sites -- Social Engineering -- The Intentional "Back Door"Attack -- Exploiting Inherent Weaknesses in Code or Programming Environments -- The Tools of the Trade -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Code Auditing and Reverse Engineering -- Introduction -- How to Efficiently Trace through a Program -- Auditing and Reviewing Selected Programming Languages -- Looking for Vulnerabilities
Pulling It All Together -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Securing Your Java Code -- Introduction -- Overview of the Java Security Architecture -- How Java Handles Security -- Potential Weaknesses in Java -- Coding Functional but Secure Java Applets -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Securing XML -- Introduction -- Defining XML -- Creating Web Applications Using XML -- The Risks Associated with Using XML -- Securing XML -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Building Safe ActiveX Internet Controls -- Introduction -- Dangers Associated with Using ActiveX -- Methodology for Writing Safe ActiveX Controls -- Securing ActiveX Controls -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Securing ColdFusion -- Introduction -- How Does ColdFusion Work? -- Preserving ColdFusion Security -- ColdFusion Application Processing -- Risks Associated with Using ColdFusion -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 11. Developing Security-Enabled Applications -- Introduction -- The Benefits of Using Security-Enabled Applications -- Types of Security Used in Applications -- Reviewing the Basics of PKI -- Using PKI to Secure Web Applications -- Implementing PKI in Your Web Infrastructure -- Testing Your Security Implementation -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 12. Cradle to Grave: Working with a Security Plan -- Introduction -- Examining Your Code -- Being Aware of Code Vulnerabilities -- Using Common Sense when Coding -- Creating a Security Plan -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Index
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. * The Yankee Group estimates the market for Web application-security products and services will grow to 1.74 billion by 2007 from 140 million in 2002 * Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book (http://www.elsevierdirect.com/v2/companion.jsp?ISBN=9781597490610)
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
Link Print version: Cross, Michael Developer's Guide to Web Application Security Rockland : Elsevier Science & Technology Books,c2007 9781597490610
Subject Computer networks -- Security measures.;Computer security.;Web sites -- Security measures
Electronic books
Alt Author Fisher, Matt
Record:   Prev Next