Web security : (Record no. 7893)

MARC details
000 -LEADER
fixed length control field 03942cam a22004218i 4500
001 - CONTROL NUMBER
control field 18182959
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170616121529.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140610s2014 flu b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014022587
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466592612 (paperback):
Terms of availability UKP 71.99
040 ## - CATALOGING SOURCE
Original cataloging agency IISER Bhopal
Language of cataloging eng
Transcribing agency IISER Bhopal
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .H3536 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 W950W
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number BUS041000
-- COM053000
-- COM060000
Source of number bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hanqing, Wu.
9 (RLIN) 20706
222 ## - KEY TITLE
Key title Computer science collection
245 10 - TITLE STATEMENT
Title Web security :
Remainder of title a whitehat perspective
Statement of responsibility, etc Wu Hanqing, Liz Zhao.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton:
Name of publisher, distributor, etc CRC press,
Date of publication, distribution, etc 2015.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 1507
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 508p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "--
520 ## - SUMMARY, ETC.
Summary, etc "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Popular works.
9 (RLIN) 20707
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 20708
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
9 (RLIN) 20709
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element World Wide Web
General subdivision Security measures.
9 (RLIN) 20710
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Management.
Source of heading or term bisacsh
9 (RLIN) 20711
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General.
Source of heading or term bisacsh
9 (RLIN) 20712
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Internet / General.
Source of heading or term bisacsh
9 (RLIN) 20713
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhao, Liz.
9 (RLIN) 20714
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Cover image
Uniform Resource Identifier <a href="http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg">http://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification   Not For Loan Reference Central Library, IISER Bhopal Central Library, IISER Bhopal Reference Section 16/06/2017 4 4770.00   005.8 W950W 8383 16/06/2017 5962.93 16/06/2017 Books Reserve



Contact for Queries: skpathak@iiserb.ac.in