top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Autore Burnett Mark (Mark M.)
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2004
Descrizione fisica 1 online resource (473 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-05628-6
9781931836434
9786611056285
0-08-047817-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related
Record Nr. UNINA-9910456392603321
Burnett Mark (Mark M.)  
Rockland, MA, : Syngress, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Autore Burnett Mark (Mark M.)
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2004
Descrizione fisica 1 online resource (473 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05628-6
9781931836434
9786611056285
0-08-047817-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related
Record Nr. UNINA-9910780456003321
Burnett Mark (Mark M.)  
Rockland, MA, : Syngress, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking the code : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Hacking the code : ASP. NET web application security / / Mark M. Burnett; James C. Foster
Autore Burnett Mark (Mark M.)
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2004
Descrizione fisica 1 online resource (473 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05628-6
9781931836434
9786611056285
0-08-047817-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related
Record Nr. UNINA-9910812693903321
Burnett Mark (Mark M.)  
Rockland, MA, : Syngress, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
Autore Bayles Aaron W
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2005
Descrizione fisica 1 online resource (473 p.)
Disciplina 004.023
Altri autori (Persone) BrindleyEd
FosterJames C
HurleyChris
LongJohnny
Soggetto topico Computer hackers
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-02028-1
9786611020286
0-08-048903-6
1-59749-043-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles
Record Nr. UNINA-9910450477203321
Bayles Aaron W  
Rockland, MA, : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
Autore Bayles Aaron W
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2005
Descrizione fisica 1 online resource (473 p.)
Disciplina 004.023
Altri autori (Persone) BrindleyEd
FosterJames C
HurleyChris
LongJohnny
Soggetto topico Computer hackers
Computer security
ISBN 1-281-02028-1
9786611020286
0-08-048903-6
1-59749-043-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles
Record Nr. UNINA-9910783744403321
Bayles Aaron W  
Rockland, MA, : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
InfoSec career hacking : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
InfoSec career hacking : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus
Autore Bayles Aaron W
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2005
Descrizione fisica 1 online resource (473 p.)
Disciplina 004.023
Altri autori (Persone) BrindleyEd
FosterJames C
HurleyChris
LongJohnny
Soggetto topico Hackers
Computer security
ISBN 1-281-02028-1
9786611020286
0-08-048903-6
1-59749-043-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles
Altri titoli varianti Sell your skillz, not your soul
Information security career hacking
Sell your skills, not your soul
Record Nr. UNINA-9910817353603321
Bayles Aaron W  
Rockland, MA, : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910456347903321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910780122103321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910816736803321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui