Narrow your search
Listing 1 - 4 of 4
Sort by
New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Authors: ---
ISBN: 9780387723662 0387723668 0387723676 Year: 2007 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.


Book
Hacking web apps : detecting and preventing web application security problems
Authors: ---
ISBN: 1283578824 9786613891273 1597499560 159749951X 9781597499569 9781597499514 9781283578820 6613891274 Year: 2012 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this

Web security and commerce.
Authors: ---
ISBN: 1565922697 9781565922693 Year: 1997 Publisher: Cambridge O'Reilly

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer networks --- Web sites --- World Wide Web (Information retrieval system) --- Réseaux d'ordinateurs --- Sites Web --- World Wide Web --- Security measures --- Sécurité --- Mesures --- Sûreté --- Electronic commerce --- 621.391 --- -Electronic commerce --- -Web sites --- -World Wide Web --- -cryptografie --- databeveiliging (informatiebeveiliging) --- firewall --- internet --- java --- javascript --- -005.8 --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer network resources --- W3 (World Wide Web) --- Web (World Wide Web) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- Distributed processing --- Security measures. --- 621.391 General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- Réseaux d'ordinateurs --- Sécurité --- Sûreté --- 005.8 --- cryptografie --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer networks - Security measures --- World Wide Web - Security measures --- Web sites - Security measures --- Electronic commerce - Security measures


Book
Pro PHP security : from application security principles to the implementation of XSS defenses
Authors: --- ---
ISBN: 1430233184 1430233192 Year: 2010 Publisher: [Berkeley, Calif.] : New York : Apress ; Distributed to the book trade worldwide by Springer Science+Business Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Provides information on securing PHP applications, covering such topics as SQL injection, XSS, remote execution, temporary files, REST services, CAPTCHAs, identity verification, and versioning.

Keywords

Computer networks -- Security measures. --- Internet software. --- PHP (Computer language). --- PHP (Computer program language) -- Handbooks, manuals, etc. --- Web site development -- Security measures -- Handbooks, manuals, etc. --- Web sites -- Security measures -- Handbooks, manuals, etc. --- PHP (Computer program language) --- Web site development --- Web sites --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- General and Others --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Development of Web sites --- Personal Home Page (Computer program language) --- Development --- Computer science. --- Data encryption (Computer science). --- Computer Science. --- Computer Science, general. --- Data Encryption. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Computer network resources --- Internet programming --- Programming languages (Electronic computers) --- Computer programming. --- Software engineering. --- Web Development. --- Software Engineering/Programming and Operating Systems. --- Cryptology. --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Internet programming. --- Cryptography. --- Software Engineering. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer programming

Listing 1 - 4 of 4
Sort by