top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Hack Proofing Your Web Applications [[electronic resource] ] : The Only Way to Stop a Hacker Is to Think Like One
Hack Proofing Your Web Applications [[electronic resource] ] : The Only Way to Stop a Hacker Is to Think Like One
Autore Syngress
Edizione [1st edition]
Pubbl/distr/stampa Burlington, : Elsevier Science, 2001
Descrizione fisica 1 online resource (625 p.)
Disciplina 005.8
Soggetto topico Computer networks
Computer security
Design
Web sites
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Soggetto genere / forma Electronic books.
ISBN 1-281-05288-4
9786611052881
0-08-047813-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994318.pdf; 1928994318.pdf; Cover; Table of Contents; Foreword; Chapter 1 Hacking Methodology; Chapter 2 How to Avoid Becoming a "Code Grinder"; Chapter 3 Understanding the Risks Associated with Mobile Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing and Reverse Engineering; Chapter 7 Securing Your Java Code; Chapter 8 Securing XML; Chapter 9 Building Safe ActiveX Internet Controls; Chapter 10 Securing ColdFusion; Chapter 11 Developing Security-Enabled Applications; Chapter 12 Cradle to Grave: Working with a Security Plan
Appendix Hack Proofing Your Web Applications Fast TrackIndex; Related Titles
Record Nr. UNINA-9910454981603321
Syngress  
Burlington, : Elsevier Science, 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hack proofing your web applications [[electronic resource] ] : the only way to stop a hacker is to think like one
Hack proofing your web applications [[electronic resource] ] : the only way to stop a hacker is to think like one
Autore Syngress
Edizione [1st edition]
Pubbl/distr/stampa Burlington, : Elsevier Science, 2001
Descrizione fisica 1 online resource (625 p.)
Disciplina 005.8
Soggetto topico Computer networks
Computer security
Design
Web sites
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
ISBN 1-281-05288-4
9786611052881
0-08-047813-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994318.pdf; 1928994318.pdf; Cover; Table of Contents; Foreword; Chapter 1 Hacking Methodology; Chapter 2 How to Avoid Becoming a "Code Grinder"; Chapter 3 Understanding the Risks Associated with Mobile Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing and Reverse Engineering; Chapter 7 Securing Your Java Code; Chapter 8 Securing XML; Chapter 9 Building Safe ActiveX Internet Controls; Chapter 10 Securing ColdFusion; Chapter 11 Developing Security-Enabled Applications; Chapter 12 Cradle to Grave: Working with a Security Plan
Appendix Hack Proofing Your Web Applications Fast TrackIndex; Related Titles
Record Nr. UNINA-9910779970503321
Syngress  
Burlington, : Elsevier Science, 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hack proofing your web applications [[electronic resource] ] : the only way to stop a hacker is to think like one
Hack proofing your web applications [[electronic resource] ] : the only way to stop a hacker is to think like one
Autore Syngress
Edizione [1st edition]
Pubbl/distr/stampa Burlington, : Elsevier Science, 2001
Descrizione fisica 1 online resource (625 p.)
Disciplina 005.8
Soggetto topico Computer networks
Computer security
Design
Web sites
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
ISBN 1-281-05288-4
9786611052881
0-08-047813-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994318.pdf; 1928994318.pdf; Cover; Table of Contents; Foreword; Chapter 1 Hacking Methodology; Chapter 2 How to Avoid Becoming a "Code Grinder"; Chapter 3 Understanding the Risks Associated with Mobile Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing and Reverse Engineering; Chapter 7 Securing Your Java Code; Chapter 8 Securing XML; Chapter 9 Building Safe ActiveX Internet Controls; Chapter 10 Securing ColdFusion; Chapter 11 Developing Security-Enabled Applications; Chapter 12 Cradle to Grave: Working with a Security Plan
Appendix Hack Proofing Your Web Applications Fast TrackIndex; Related Titles
Record Nr. UNINA-9910812308803321
Syngress  
Burlington, : Elsevier Science, 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui