Seven Deadliest Web Application Attacks

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security, General Computing
Cover of the book Seven Deadliest Web Application Attacks by Mike Shema, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mike Shema ISBN: 9781597495448
Publisher: Elsevier Science Publication: February 20, 2010
Imprint: Syngress Language: English
Author: Mike Shema
ISBN: 9781597495448
Publisher: Elsevier Science
Publication: February 20, 2010
Imprint: Syngress
Language: English
Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different attacks conducted against Web sites. The methodology behind the attack is explored, showing its potential impact. Then, the chapter moves on to address possible countermeasures for different aspects of the attack.
The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in Web sites and Web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the Web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also discussed.
This book is intended for anyone who uses the Web to check e-mail, shop, or work. Web application developers and security professionals will benefit from the technical details and methodology behind the Web attacks covered in this book. Executive level management will benefit from understanding the threats to a Web site, and in many cases, how a simple attack requiring nothing more than a Web browser can severely impact a site.

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different attacks conducted against Web sites. The methodology behind the attack is explored, showing its potential impact. Then, the chapter moves on to address possible countermeasures for different aspects of the attack.
The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in Web sites and Web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the Web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also discussed.
This book is intended for anyone who uses the Web to check e-mail, shop, or work. Web application developers and security professionals will benefit from the technical details and methodology behind the Web attacks covered in this book. Executive level management will benefit from understanding the threats to a Web site, and in many cases, how a simple attack requiring nothing more than a Web browser can severely impact a site.

More books from Elsevier Science

Cover of the book Applied Operational Excellence for the Oil, Gas, and Process Industries by Mike Shema
Cover of the book Transgenic Animal Technology by Mike Shema
Cover of the book Elements of Statistical Mechanics by Mike Shema
Cover of the book Emerging Technologies for Food Processing by Mike Shema
Cover of the book Atomic and Molecular Photoabsorption by Mike Shema
Cover of the book The Cellular Secretome and Organ Crosstalk by Mike Shema
Cover of the book Models of Itinerant Ordering in Crystals by Mike Shema
Cover of the book Vicinal Diaryl Substituted Heterocycles by Mike Shema
Cover of the book Industrial Gums by Mike Shema
Cover of the book Combined Cycle Systems for Near-Zero Emission Power Generation by Mike Shema
Cover of the book Securing HP NonStop Servers in an Open Systems World by Mike Shema
Cover of the book Bioprocess Engineering by Mike Shema
Cover of the book Fundamentals and Applications of Supercritical Carbon Dioxide (SCO2) Based Power Cycles by Mike Shema
Cover of the book Disorders of the Cervical Spine by Mike Shema
Cover of the book Exposure Science by Mike Shema
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy