Enforcing code security in database web applications using libraries and object models
LCSD '07 Proceedings of the 2007 Symposium on Library-Centric Software Design
An empirical investigation into open source web applications' implementation vulnerabilities
Empirical Software Engineering
Cooperative intrusion detection for web applications
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Hi-index | 0.00 |
Implement bulletproof e-business security the proven Hacking Exposed wayDefend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals. Table of contentsChapter 1: Hacking Web Apps 101Chapter 2: ProfilingChapter 3: Hacking Web PlatformsChapter 4: Attacking Web AuthenticationChapter 5: Attacking Web AuthorizationChapter 6: Input Validation AttacksChapter 7: Attacking Web DatastoresChapter 8: Attacking XML Web ServicesChapter 9: Attacking Web Application ManagementChapter 10: Hacking Web ClientsChapter 11: Denial-of-Service (DoS) AttacksChapter 12: Full-Knowledge AnalysisChapter 13: Web Application Security ScannersAPPENDIX A: WEB APPLICATION SECURITY CHECKLISTAPPENDIX B: WEB HACKING TOOLS AND TECHNIQUES CRIBSHEETAPPENDIX C: URLScan AND ModSecurityAPPENDIX D: ABOUT THE COMPANION WEB SITEINDEX