LEADER 01075nam--2200337---450 001 990003252510203316 005 20201112091742.0 010 $a0-7146-4714-4 (rilegato) 010 $a0-7146-4260-6 (in brossura) 035 $a000325251 035 $aUSA01000325251 035 $a(ALEPH)000325251USA01 035 $a000325251 100 $a20090522h1996----km-y0itay50------ba 101 $aeng 102 $aGB 105 $a||||||||001yy 200 1 $aIntercultural contacts in the Medieval Mediterranean$estudies in honour of David Jacoby$fedited by Benjamin Arbel 210 $aLondon$aPortland$cF. Cass$d1996 215 $a340 p.$d22 cm 606 0 $aComunicazione interculturale$yPaesi Mediterranei$zMedioevo$xScritti in onore$2BNCF 676 $a909.09822 702 1$aARBEL,$bBenjamin 702 1$aJACOBY,$bDavid 801 0$aIT$bsalbc$gISBD 912 $a990003252510203316 951 $aX.1.B. 1204$b214716 L.M.$cX.3.$d002254048 959 $aBK 969 $aUMA 996 $aIntercultural contacts in the Medieval Mediterranean$91119554 997 $aUNISA LEADER 02964nam 2200685 a 450 001 9910462337303321 005 20200520144314.0 010 $a1-283-57882-4 010 $a9786613891273 010 $a1-59749-956-0 035 $a(CKB)2670000000237716 035 $a(EBL)1012529 035 $a(OCoLC)811491532 035 $a(SSID)ssj0000705107 035 $a(PQKBManifestationID)12331338 035 $a(PQKBTitleCode)TC0000705107 035 $a(PQKBWorkID)10623005 035 $a(PQKB)10160643 035 $a(MiAaPQ)EBC1012529 035 $a(CaSebORM)9781597499514 035 $a(Au-PeEL)EBL1012529 035 $a(CaPaEBR)ebr10595533 035 $a(CaONFJC)MIL389127 035 $a(EXLCZ)992670000000237716 100 $a20120824d2012 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking web apps$b[electronic resource] $edetecting and preventing web application security problems /$fMike Shema ; technical editor Jorge Blanco Alcover 205 $a1st edition 210 $aWaltham, Mass. $cSyngress$d2012 215 $a1 online resource (297 p.) 300 $aIncludes index. 311 $a1-59749-951-X 320 $aIncludes bibliographical references and index. 327 $aHTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks. 330 $aHow can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this 606 $aComputer networks$xSecurity measures 606 $aWeb site development$xSecurity measures 606 $aApplication software$xSecurity measures 606 $aComputer security 606 $aComputer crimes$xPrevention 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aWeb site development$xSecurity measures. 615 0$aApplication software$xSecurity measures. 615 0$aComputer security. 615 0$aComputer crimes$xPrevention. 676 $a005.8 700 $aShema$b Mike$01056168 701 $aAlcover$b Jorge Blanco$01056169 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462337303321 996 $aHacking web apps$92490313 997 $aUNINA