Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Hacking exposed : (Record no. 8703)

MARC details
000 -LEADER
fixed length control field 03261cam a22003974i 4500
001 - CONTROL NUMBER
control field 16532832
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200810102510.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101104s2011 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010043890
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071740647 (alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S32 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number S.J.H
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Scambray, Joel,
Relator term author.
245 10 - TITLE STATEMENT
Title Hacking exposed :
Remainder of title web applications : web application security secrets and solutions /
Statement of responsibility, etc Joel Scambray, Vincent Liu, Caleb Sima.
250 ## - EDITION STATEMENT
Edition statement third edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw-Hill,
Date of publication, distribution, etc [2011]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 451 pages :
Other physical details illustartions ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Hacking web apps 101 --<br/>Profiling --<br/>Hacking web platforms --<br/>Attacking web authentication --<br/>Attacking web authorization --<br/>Input injection attacks --<br/>Attacking XML web services --<br/>Attacking web application management --<br/>Hacking web clients --<br/>The Enterprise web application security program --<br/>Web application security checklist --<br/>Web hacking tools and techniques cribsheet.
520 ## - SUMMARY, ETC.
Summary, etc Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.<br/><br/>Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster<br/>See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation<br/>Understand how attackers defeat commonly used Web authentication technologies<br/>See how real-world session attacks leak sensitive data and how to fortify your applications<br/>Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques<br/>Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments<br/>Safety deploy XML, social networking, cloud computing, and Web 2.0 services<br/>Defend against RIA, Ajax, UGC, and browser-based, client-side exploits<br/>Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Web sites
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Vincent.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sima, Caleb.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3576">http://repository.fue.edu.eg/xmlui/handle/123456789/3576</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Acquisition method Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 23/09/2014 Academic bookshop Donation 1 1 005.8 S.J.H 00011408 19/02/2025 13/04/2017 23/09/2014 Books