Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster |
Autore | Burnett Mark (Mark M.) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2004 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05628-6
9781931836434 9786611056285 0-08-047817-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related |
Record Nr. | UNINA-9910456392603321 |
Burnett Mark (Mark M.) | ||
Rockland, MA, : Syngress, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking the code [[electronic resource] ] : ASP. NET web application security / / Mark M. Burnett; James C. Foster |
Autore | Burnett Mark (Mark M.) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2004 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05628-6
9781931836434 9786611056285 0-08-047817-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related |
Record Nr. | UNINA-9910780456003321 |
Burnett Mark (Mark M.) | ||
Rockland, MA, : Syngress, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking the code : ASP. NET web application security / / Mark M. Burnett; James C. Foster |
Autore | Burnett Mark (Mark M.) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2004 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05628-6
9781931836434 9786611056285 0-08-047817-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Chapter 1 Managing Users; Chapter 2 Authenticating and Authorizing Users; Chapter 3 Managing Sessions; Chapter 4 Encrypting Private Data; Chapter 5 Filtering User Input; Chapter 6 Accessing Data; Chapter 7 Developing Secure ASP.NET Applications; Chapter 8 Securing XML; Appendix A Understanding .NET Security; Appendix B Glossary of Web Application Security Threats; Related |
Record Nr. | UNINA-9910812693903321 |
Burnett Mark (Mark M.) | ||
Rockland, MA, : Syngress, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Computer hackers
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-02028-1
9786611020286 0-08-048903-6 1-59749-043-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Record Nr. | UNINA-9910450477203321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Computer hackers
Computer security |
ISBN |
1-281-02028-1
9786611020286 0-08-048903-6 1-59749-043-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Record Nr. | UNINA-9910783744403321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Hackers
Computer security |
ISBN |
9786611020286
9781281020284 1281020281 9780080489032 0080489036 9781597490436 1597490431 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Altri titoli varianti |
Sell your skillz, not your soul
Information security career hacking Sell your skills, not your soul |
Record Nr. | UNINA-9910817353603321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910456347903321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910780122103321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910816736803321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|