|
|
Showing 1 - 1 of
1 matches in All Departments
Web applications are used every day by millions of users, which
is why they are one of the most popular vectors for attackers.
Obfuscation of code has allowed hackers to take one attack and
create hundreds-if not millions-of variants that can evade your
security measures. "Web Application Obfuscation "takes a look at
common Web infrastructure and security controls from an attacker's
perspective, allowing the reader to understand the shortcomings of
their security systems. Find out how an attacker would bypass
different types of security controls, how these very security
controls introduce new types of vulnerabilities, and how to avoid
common pitfalls in order to strengthen your defenses.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec
Reviews"Looks at security tools like IDS/IPS that are often the
only defense in protecting sensitive data and assetsEvaluates Web
application vulnerabilties from the attacker's perspective and
explains how these very systems introduce new types of
vulnerabilitiesTeaches how to secure your data, including info on
browser quirks, new attacks and syntax tricks to add to your
defenses against XSS, SQL injection, and more
|
You may like...
Big Beats
Various Artists
CD
R166
Discovery Miles 1 660
Small Axe
Bob Marley
CD
R128
Discovery Miles 1 280
Simply Cuba
Various Artists
CD
R145
R123
Discovery Miles 1 230
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.