Testing Web Security: Assessing the Security of Web Sites and Applications
Steven Splaine
立即出貨 (庫存=1)
買這商品的人也買了...
-
$2,100$1,995Design Patterns: Elements of Reusable Object-Oriented Software (Hardcover)
-
$980$784C++ Primer, 3/e 中文版
-
$990$970Introduction to Algorithms, 2/e
-
$560$437Design Patterns 於 Java 語言上的實習應用
-
$1,050$1,029Reuse Methodology Manual for System-On-A-Chip Designs, 3/e (Hardcover)
-
$450$351JavaScript 範例活用辭典
-
$1,741$1,654Understanding the Linux Kernel, 2/e (Paperback)
-
$1,400
Embedded Software Development with eCos
-
$620$527PHP & MySQL 完全架站攻略第二版
-
$760$600802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide)
-
$590$502ASP.NET 程式設計徹底研究
-
$280$224Borland 傳奇
-
$680$544Windows Server 2003 網路與 IIS 架站指南
-
$690$538STRUTS 實作手冊(Struts in Action: Building Web Applications with the Leading Java Framework)
-
$720$576重構─改善既有程式的設計
-
$560$448Practical Java Programming Language Guide 中文版 (Practical Java Programming Language Guide)
-
$590$502XOOPS2 網站架設與管理
-
$560$476鳥哥的 Linux 私房菜─基礎學習篇增訂版
-
$450$360Linux 防火牆:iptables
-
$290$232電腦組裝與維護
-
$850$723SCJP‧SCJD 專業認證指南 (Sun Certified Programmer & Developer for Java 2 #310-305 與310-027)
-
$750$600JSP 2.0 技術手冊
-
$480$408RFID 技術與應用
-
$780$663Linux 系統管理實務─自動化、備份救援、系統安全、叢集
-
$640$512ISA Server 2004 防火牆安裝與管理指南
商品描述
* Covers security basics and guides reader through the process of testing a
Web site.
* Explains how to analyze results and design specialized follow-up
tests that focus on potential security gaps.
* Teaches the process of
discovery, scanning, analyzing, verifying results of specialized tests, and
fixing vulnerabilities.
Table of Contents
Acknowledgments.
Foreword.
Preface.
Part One An Introduction to the Book.
Chapter 1 Introduction.
Chapter 2 Test Planning.
Chapter 3 Network Security.
Chapter 4 System Software Security.
Chapter 5 Client-Side Application Security.
Chapter 6 Server-Side Application Security.
Chapter 7 Sneak Attacks: Guarding against the Less-Thought-of Security Threats.
Chapter 8 Intruder Confusion, Detection, and Response.
Chapter 9 Assessment and Penetration Options.
Chapter 10 Risk Analysis.
Appendix A An Overview of Network Protocols, Addresses, and Devices.
Appendix B SANS Institute Top 20 Critical Internet Security Vulnerabilities.
Appendix C Test-Deliverable Templates.