Narrow your search
Listing 1 - 4 of 4
Sort by

Book
Penetration Testing mit mimikatz : Das Praxis-HandbuchHacking-Angriffe verstehen und Pentests durchführen.
Author:
ISBN: 3747501621 Year: 2020 Publisher: Frechen : mitp,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Biographical note: Long description:


Book
The web application hacker's handbook : finding and exploiting security flaws
Authors: ---
ISBN: 9781118026472 1118026470 9786613258212 1283258218 1118175220 9781283258210 9781118175224 Year: 2011 Publisher: Indianapolis, IN : John Wiley & Sons, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack


Book
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Authors: ---
ISBN: 9780124116443 Year: 2013 Publisher: Amsterdam : Syngress, an imprint of Elsevier,


Book
Hacking web apps : detecting and preventing web application security problems
Authors: ---
ISBN: 1283578824 9786613891273 1597499560 159749951X 9781597499569 9781597499514 9781283578820 6613891274 Year: 2012 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this

Listing 1 - 4 of 4
Sort by