1.

Record Nr.

UNINA9910785233603321

Autore

Hecimovich Gregg A.

Titolo

Austen's Emma / Gregg A. Hecimovich

Pubbl/distr/stampa

London ; New York, : Continuum, 2008

ISBN

1-4411-0927-7

1-4742-1125-9

1-282-87404-7

9786612874048

1-4411-3493-X

Descrizione fisica

1 online resource (126 p.)

Collana

Continuum reader's guides

Disciplina

823/.7

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references (pages 101-114) and index

Nota di contenuto

1. Contexts -- 2. Language, Style and Form -- 3. Reading Emma -- 4. Critical Reception and Publishing History -- 5. Adaptation, interpretation and influence -- 6. Guide to Further Reading -- Index

Sommario/riassunto

"Emma is one of Jane Austen's most popular novels, in large part due to the impact of Emma Woodhouse, the "handsome, clever and rich" heroine. This lively, informed and insightful guide to Emma explores the style, structure, themes, critical reputation and literary influence of Jane Austen's classic novel and also discusses its film and TV versions. It includes points for discussion, suggestions for further study and an annotated guide to relevant reading. This introduction to the text is the ideal companion to study, offering guidance on the literary and historical context, reading the text, the critical reception and publishing history, adaptation and interpretation and a guide to further reading."--Bloomsbury Publishing

Emma is one of Jane Austen's most popular novels, in large part due to the impact of Emma Woodhouse, the "handsome, clever and rich" heroine. This lively, informed and insightful guide to Emma explores the style, structure, themes, critical reputation and literary influence of Jane Austen's classic novel and also discusses its film and TV versions. It includes points for discussion, suggestions for further study and an



annotated guide to relevant reading. This introduction to the text is the ideal companion to study, offering guidance on the literary and historical context, reading the text, the critical reception and publishing history, adaptation and interpretation and a guide to further reading.

2.

Record Nr.

UNINA9910779756803321

Autore

Pauli Joshua J

Titolo

The basics of web hacking : tools and techniques to attack the Web / / Josh Pauli  ; Scott White, technical editor

Pubbl/distr/stampa

Amsterdam, : Syngress, an imprint of Elsevier, 2013

Amsterdam ; ; Boston : , : Syngress, an imprint of Elsevier, , 2013

ISBN

0-12-416659-8

Edizione

[1st edition]

Descrizione fisica

1 online resource (xiii, 145 pages) : illustrations (some color)

Collana

The basics The basics of web hacking

Disciplina

005.8

Soggetti

Web sites - Security measures

Web applications - Security measures

Computer networks - Security measures

Penetration testing (Computer security)

Computer hackers

Computer crimes - Prevention

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front Cover; The Basics of Web Hacking: Tools and Techniques to Attack the Web; Copyright; Dedication; Acknowledgments; Honey Bear; Lizard; Baby Bird; Family and Friends; Security Community; Scott White-Technical Reviewer; Syngress Team; My Vices; Biography; Foreword; Introduction; About this Book; A Hands-on Approach; What's in this Book?; A Quick Disclaimer; Contents; Chapter 1: The Basics of Web Hacking; Introduction; What Is a Web Application?; What You Need to Know About Web Servers; What You Need to Know About HTTP; HTTP Cycles; Noteworthy HTTP Headers; Noteworthy HTTP Status Codes

The Basics of Web Hacking: Our ApproachOur Targets; Our Tools; Web



Apps Touch Every Part of IT; Existing Methodologies; The Open-Source Security Testing Methodology Manual (OSSTM); Penetration Testing Execution Standard (PTES); Making Sense of Existing Methodologies; Most Common Web Vulnerabilities; Injection; Cross-site Scripting (XSS); Broken Authentication and Session Management; Cross-site Request Forgery; Security Misconfiguration; Setting Up a Test Environment; Target Web Application; Installing the Target Web Application; Configuring the Target Web Application; DVWA Install Script

Chapter 2: Web Server HackingIntroduction; Reconnaissance; Learning About the Web Server; The Robots.txt File; Port Scanning; Nmap; Updating Nmap; Running Nmap; Nmap Scripting Engine (NSE); Vulnerability Scanning; Nessus; Installing Nessus; Configuring Nessus; Running Nessus; Reviewing Nessus Results; Nikto; Exploitation; Basics of Metasploit; Search; Use; Show Payloads; Set Payload; Show Options; Set Option; Exploit; Maintaining Access; Chapter 3: Web Application Recon and Scanning; Introduction; Web Application Recon; Basics of a Web Proxy; Burp Suite; Configuring Burp Proxy

Spidering with BurpAutomated Spidering; Manual Spidering; Running Burp Spider; Web Application Scanning; What a Scanner Will Find; What a Scanner Won't Find; Scanning with ZED Attack Proxy (ZAP); Configuring ZAP; Running ZAP; Reviewing ZAP Results; ZAP Brute Force; Scanning with Burp Scanner; Configuring Burp Scanner; Running Burp Scanner; Reviewing Burp Scanner Results; Chapter 4: Web Application Exploitation with Injection; Introduction; SQL Injection Vulnerabilities; SQL Interpreter; SQL for Hackers; SQL Injection Attacks; Finding the Vulnerability; Bypassing Authentication

Extracting Additional InformationHarvesting Password Hashes; Offline Password Cracking; sqlmap; Operating System Command Injection Vulnerabilities; O/S Command Injection for Hackers; Operating System Command Injection Attacks; Web Shells; Chapter 5: Web Application Exploitation with Broken Authentication and Path Traversal; Introduction; Authentication and Session Vulnerabilities; Path Traversal Vulnerabilities; Brute Force Authentication Attacks; Intercepting the Authentication Attempt; Configuring Burp Intruder; Intruder Payloads; Running Intruder; Session Attacks; Cracking Cookies

Burp Sequencer

Sommario/riassunto

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a ""path of least resistance"" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabili