Web Application Vulnerabilities: Detect, Exploit, Prevent
来源:互联网 发布:杭州市行知中学通行证 编辑:程序博客网 时间:2024/06/01 08:57
Steven Palmer "Web Application Vulnerabilities: Detect, Exploit, Prevent" Syngress (September 28, 2007) | ISBN: 1597492094 | 480 pages | PDF | 14,3 Mb This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect, exploit, and ultimately prevent these vulnerabilities. Next, the authors cover advanced techniques of exploiting vulnerabilities such as SQL Injection, Arbitrary command injection, and more.· Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.· See why Cross Site Scripting attacks can be so devastating.· Download working code from the companion Web site.http://depositfiles.com/files/3132593http://rapidshare.com/files/84871204/Web_Application_Vulnerabilities_Detect__Exploit__Prevent.rarhttp://www.filefactory.com/file/cfcd44/
- Web Application Vulnerabilities: Detect, Exploit, Prevent
- Web Application Vulnerabilities: Detect, Exploit, Prevent
- Web Application Vulnerabilities: Detect, Exploit, Prevent (Paperback), Sep.2007.eBook-BBL
- Exploiting Web application vulnerabilities
- Five common Web application vulnerabilities
- Web Application Firewall Bypasses and PHP Exploit
- unable to detect application namespace
- web exploit toolkit
- Fortigate UTM WAF Appliance - Multiple Web Vulnerabilities
- MS08-012 Vulnerabilities in Microsoft Office Publisher Could Allow Remote Code exploit
- 非常见SQL注入漏洞及利用 Unusual SQL injection vulnerabilities and how to exploit them
- 非常见SQL注入漏洞及利用 Unusual SQL injection vulnerabilities and how to exploit them
- Using setJavaScriptEnabled can introduce XSS vulnerabilities into you application
- Unable to detect application ABI's
- Unable to detect application ABI's
- exploit
- exploit
- Exploit
- crypt()不是线程安全的
- Linux的几个概念
- Oracle by Example - Oracle Database 10g Release 2 on a Single Database Instance (All In One CHM)
- 最近oracle开发中遇到的一些问题及解决办法(二)待续
- 基于SQL几个常用的几个系统表
- Web Application Vulnerabilities: Detect, Exploit, Prevent
- 详细解说 STL 排序(Sort)
- 关于技术人员转到项目经理的一点思考
- Oracle Database 11g SQL
- STL XP
- http://www.stlchina.org/twiki/bin/view.pl/Main/STLDetailHashMap#2.1%20一个简单实例
- 选择文件和路径的应用
- 详细解说STL hash_map系列
- ASP.NET程序中常用的三十三种代码