000 03942cam a22004218i 4500
001 18182959
003 OSt
005 20170616121529.0
008 140610s2014 flu b 001 0 eng
010 _a 2014022587
020 _a9781466592612 (paperback):
_cUKP 71.99
040 _aIISER Bhopal
_beng
_cIISER Bhopal
042 _apcc
050 0 0 _aTK5105.59
_b.H3536 2014
082 0 0 _a005.8 W950W
_223
084 _aBUS041000
_aCOM053000
_aCOM060000
_2bisacsh
100 1 _aHanqing, Wu.
_920706
222 _aComputer science collection
245 1 0 _aWeb security :
_ba whitehat perspective
_cWu Hanqing, Liz Zhao.
260 _aBoca Raton:
_bCRC press,
_c2015.
263 _a1507
300 _axxii, 508p.
504 _aIncludes bibliographical references and index.
520 _a"This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "--
520 _a"Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"--
650 0 _aComputer networks
_xSecurity measures
_vPopular works.
_920707
650 0 _aComputer security.
_920708
650 0 _aInternet
_xSecurity measures.
_920709
650 0 _aWorld Wide Web
_xSecurity measures.
_920710
650 7 _aBUSINESS & ECONOMICS / Management.
_2bisacsh
_920711
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
_920712
650 7 _aCOMPUTERS / Internet / General.
_2bisacsh
_920713
700 1 _aZhao, Liz.
_920714
856 4 2 _3Cover image
_uhttp://images.tandf.co.uk/common/jackets/websmall/978146659/9781466592612.jpg
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c7893
_d7893