Muutke küpsiste eelistusi

E-raamat: Penetration Tester's Guide to Web Applications

  • Formaat: 280 pages
  • Ilmumisaeg: 31-Jan-2019
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781630816247
  • Formaat - PDF+DRM
  • Hind: 73,71 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 280 pages
  • Ilmumisaeg: 31-Jan-2019
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781630816247

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities. The book focuses on offensive security and how to attack web applications. It describes each of the Open Web Application Security Project (OWASP) top ten vulnerabilities, including broken authentication, cross-site scripting and insecure deserialization, and details how to identify and exploit each weakness. Readers learn to bridge the gap between high-risk vulnerabilities and exploiting flaws to get shell access. The book demonstrates how to work in a professional services space to produce quality and thorough testing results by detailing the requirements of providing a best-of-class penetration testing service. It offers insight into the problem of not knowing how to approach a web app pen test and the challenge of integrating a mature pen testing program into an organization. Based on the author's many years of first-hand experience, this book provides examples of how to break into user accounts, how to breach systems, and how to configure and wield penetration testing tools.
Preface vii
1 Introduction
1(8)
2 OWASP A1:2017 Injection
9(22)
3 OWASP A2:2017 Broken Authentication
31(12)
4 OWASP A3:2017 Sensitive Data Exposure
43(12)
5 OWASP A4:2017 XML External Entities (XXE)
55(22)
6 OWASP A5:2017 Broken Access Control
77(20)
7 OWASP A6:2017 Security Misconflguration
97(22)
8 OWASP A7:2017 Cross-Site Scripting (XSS)
119(18)
9 OWASP A8:2017 Insecure Deserialization
137(14)
10 OWASP A9:2017 Using Components with Known Vulnerabilities
151(16)
11 OWASP A10:2017 Insufficient Logging and Monitoring
167(12)
12 Beyond the OWASP Top 10
179(16)
13 Testing as a Consultant and Adding Value
195(4)
14 About the Author
199(2)
15 Index
201