LEADER 03453nam 22007813u 450 001 9910812308803321 005 20230120003808.0 010 $a1-281-05288-4 010 $a9786611052881 010 $a0-08-047813-1 035 $a(CKB)111035898513106 035 $a(EBL)294159 035 $a(OCoLC)50688999 035 $a(SSID)ssj0000166776 035 $a(PQKBManifestationID)11164930 035 $a(PQKBTitleCode)TC0000166776 035 $a(PQKBWorkID)10181478 035 $a(PQKB)11117846 035 $a(CaSebORM)9781928994312 035 $a(MiAaPQ)EBC294159 035 $a(OCoLC)910938038 035 $a(OCoLC)ocn910938038 035 $a(EXLCZ)99111035898513106 100 $a20140113d2001|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHack proofing your web applications $ethe only way to stop a hacker is to think like one 205 $a1st edition 210 $aBurlington $cElsevier Science$d2001 215 $a1 online resource (625 p.) 300 $aDescription based upon print version of record. 311 $a1-928994-31-8 327 $a1928994318.pdf; 1928994318.pdf; Cover; Table of Contents; Foreword; Chapter 1 Hacking Methodology; Chapter 2 How to Avoid Becoming a "Code Grinder"; Chapter 3 Understanding the Risks Associated with Mobile Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing and Reverse Engineering; Chapter 7 Securing Your Java Code; Chapter 8 Securing XML; Chapter 9 Building Safe ActiveX Internet Controls; Chapter 10 Securing ColdFusion; Chapter 11 Developing Security-Enabled Applications; Chapter 12 Cradle to Grave: Working with a Security Plan 327 $aAppendix Hack Proofing Your Web Applications Fast TrackIndex; Related Titles 330 $aFrom the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've enter 517 3 $aOnly way to stop a hacker is to think like one 606 $aComputer networks 606 $aComputer security 606 $aComputer security 606 $aDesign 606 $aWeb sites 606 $aWeb sites 606 $aElectrical & Computer Engineering$2HILCC 606 $aEngineering & Applied Sciences$2HILCC 606 $aTelecommunications$2HILCC 615 4$aComputer networks. 615 4$aComputer security. 615 4$aComputer security. 615 4$aDesign. 615 4$aWeb sites. 615 4$aWeb sites. 615 7$aElectrical & Computer Engineering 615 7$aEngineering & Applied Sciences 615 7$aTelecommunications 676 $a005.8 676 $a005.8 700 $aSyngress$01087004 702 $aForristal$b Jeff 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910812308803321 996 $aHack proofing your web applications$94113046 997 $aUNINA