Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Web Hacking
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Web Hacking

Web Hacking

Attacks and Defense

Stuart Mc Clure, Saumil Shah, Shreeraj Shah

520 pages, parution le 06/09/2002

Résumé

Whether its petty defacing or full-scale cyber-robbery, hackers are moving to the web along with everyone else. In this highly-anticipated new book, security experts Stuart McClure co-author of Hacking Exposed, Saumil Shah, and Shreeraj Shah uncover the latest web attacks and defenses. Web Hacking features include:

  • Complete web application security methodologies with detailed techniques and attacks
  • Countermeasures for web attacks
  • New tools
  • New case studies and eye-opening web attack scenarios
  • Solutions from the security authorities you trust

Web Hacking is the ultimate technical good read. With solid technical content, keen analysis, and acclaimed cut-to-the-chase writing style, the authors bring unparalleled insight to both well-known and lesser-known web vulnerabilities. They show how to defend your web servers and web-based payment systems. They explain the complete range of attacks, including buffer overflows, the most wicked of attacks. "How Do They Do It?" real-world case studies describe how different attacks work and why they work.

With 95% of all hacker attacks occurring despite a firewall in place, the firewall has become nothing more than a speed bump on the information superhighway. And with web application traffic making up the bulk of the attacks, the cyber-playground is fraught with vandals and bullies who can't wait to get into your pockets.

Enterprise Resource Planning (ERP) vendors are betting the farm on the web. Nearly all of their development efforts are going into deploying web frontends onto their existing backend enterprise software applications. And today'sconnectivity-hungry vendors want every device imaginable on their Internet. Pagers, cell phones, PDA's, and emergency radios only scratch the surface of this house of cards.

Companies and individuals need to wake up and smell the coffin. The web is where all business transactions are moving, and if customers don't demand them, concepts such as privacy and security will simply pass us by.

Implement the techniques and wisdom in Web Hacking to protect your critical corporate and customer information from malicious hackers. You can't afford not to.


Contents
I. THE E-COMMERCE PLAYGROUND
1 Web languages
2 Web and Database servers
3 Payment systems and Shopping Carts
4 HTTP and HTTPS
5 URL: The web hacker's sword
II URLS UNRAVELED
Case Study: the value of understanding the URL
6 Web: Under(the)Cover
7 Source Exposure
8 Site linkage and analysis
III HOW DO THEY DO IT?
Introduction
9 Cyber Grafitti
10 Eshoplifting
11 Database access
12 Java remote command execution
13 Impersonation
14 Buffer overflows - on-the-fly
IV ADVANCED WEB KUNG FU
15 Automating the attacks
16 Worms
17 Beating the IDS
APPENDIX
A Web ports listing
B HTTP/10 and HTTP/11 Protocol Methods and field definitions
C Remote command execution cheatsheet (ASP/JSP/Perl/PHP)
D Source code disclosure cheatsheet (ASP/JSP/Perl/PHP)
E Links and Resources
F Tools (free/commercial and dictionaries, custom created attack and pilfer scripts)

L'auteur - Stuart Mc Clure

Stuart McClure, President/CTO, Foundstone, Inc., brings over 12 years of IT and security experience to Foundstone. Stuart is a successful security author, speaker, and teacher whose writings have been translated into dozens of languages around the world.
Stuart is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions, which has been translated into 19 languages, and has received critical acclaim around the world. In addition, it was ranked the #4 computer book sold on Amazon in 2001, positioning it as the best selling security book ever sold.

L'auteur - Saumil Shah

Saumil Shah, Director of India Operations, Foundstone, Inc., provides information security consulting services to Foundstone clients, specializing in ethical hacking and security architecture. He holds a designation of Certified Information Systems Security Professional. Saumil has had more than six years experience with system administration, network architecture, integrating heterogenous platforms, and information security, and has perfomed numerous ethical hacking exercises for many important IT companies.

L'auteur - Shreeraj Shah

Shreeraj Shah, Consultant & Software Engineer, Foundstone Inc., provides Web Application security-consulting services to Foundstone clients, specializing in analyzing security architecture for Internet/Intranet applications. He has had over 5 years of experience with application development, system administration and application architecture.

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Stuart Mc Clure, Saumil Shah, Shreeraj Shah
Parution 06/09/2002
Nb. de pages 520
Format 18,5 x 23,2
Couverture Broché
Poids 1045g
Intérieur Noir et Blanc
EAN13 9780201761764

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription