MARC details
| 000 -LEADER |
| fixed length control field |
03261cam a22003974i 4500 |
| 001 - CONTROL NUMBER |
| control field |
16532832 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20200810102510.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
101104s2011 nyua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2010043890 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780071740647 (alk. paper) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| Description conventions |
rda |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5105.59 |
| Item number |
.S32 2011 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| Item number |
S.J.H |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Scambray, Joel, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Hacking exposed : |
| Remainder of title |
web applications : web application security secrets and solutions / |
| Statement of responsibility, etc |
Joel Scambray, Vincent Liu, Caleb Sima. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
third edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New York : |
| Name of publisher, distributor, etc |
McGraw-Hill, |
| Date of publication, distribution, etc |
[2011] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
c2011. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxvi, 451 pages : |
| Other physical details |
illustartions ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Hacking web apps 101 --<br/>Profiling --<br/>Hacking web platforms --<br/>Attacking web authentication --<br/>Attacking web authorization --<br/>Input injection attacks --<br/>Attacking XML web services --<br/>Attacking web application management --<br/>Hacking web clients --<br/>The Enterprise web application security program --<br/>Web application security checklist --<br/>Web hacking tools and techniques cribsheet. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.<br/><br/>Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster<br/>See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation<br/>Understand how attackers defeat commonly used Web authentication technologies<br/>See how real-world session attacks leak sensitive data and how to fortify your applications<br/>Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques<br/>Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments<br/>Safety deploy XML, social networking, cloud computing, and Web 2.0 services<br/>Defend against RIA, Ajax, UGC, and browser-based, client-side exploits<br/>Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Web sites |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Liu, Vincent. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Sima, Caleb. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3576">http://repository.fue.edu.eg/xmlui/handle/123456789/3576</a> |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |