02711nam 2200613Ia 450 991045639260332120200520144314.01-281-05628-6978193183643497866110562850-08-047817-4(CKB)111090425053500(EBL)294160(OCoLC)437181461(SSID)ssj0000166815(PQKBManifestationID)11155552(PQKBTitleCode)TC0000166815(PQKBWorkID)10168502(PQKB)10808053(MiAaPQ)EBC294160(CaSebORM)9781932266658(Au-PeEL)EBL294160(CaPaEBR)ebr10056575(CaONFJC)MIL105628(EXLCZ)9911109042505350020030410d2004 uy 0engurcn| |||||txtccrHacking the code[electronic resource] ASP. NET web application security /Mark M. Burnett; James C. Foster1st editionRockland, MA Syngress20041 online resource (473 p.)Includes index.1-932266-65-8 Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; RelatedHacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commentedComputer networksSecurity measuresComputer securityElectronic books.Computer networksSecurity measures.Computer security.005.8Burnett Mark(Mark M.)627556Foster James C156401MiAaPQMiAaPQMiAaPQBOOK9910456392603321Hacking the code2492170UNINA