Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense
Date: 02 April 2011, 19:56

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Web Hacking: Attacks and Defense " from UseNet for FREE!

Part One, The E-Commerce Playground, contains five chapters.
• Chapter 1, Web Languages: The Babylon of the 21st Century—discusses all the major Web languages used on the Internet today.
• Chapter 2, Web and Database Servers—discusses the technologies behind the Web and how they introduce vulnerabilities.
• Chapter 3, Shopping Carts and Payment Gateways—discusses the technologies behind online shopping carts and E-commerce sites on the Web.
• Chapter 4, HTTP and HTTPS: The Hacking Protocols—discusses the two main protocols used to direct Web and E-commerce traffic on the Internet.
• Chapter 5, URL: The Web Hacker’s Sword—discusses understanding everything about a Web site just from reading the URL.
Part Two, URLs Unraveled, contains three chapters.
• Chapter 6, Web: Under(the)Cover—discusses the details of a complete Web application, including all its components and dependencies.
• Chapter 7, Reading Between the Lines—discusses the fine art of disclosing source in a Web browser or alternative interface.
• Chapter 8, Site Linkage Analysis—discusses how attackers inventory a Web site to understand the application as a whole and how to attack it.
Part Three, How Do They Do It?, contains six chapters.
• Chapter 9, Cyber Grafitti—discusses how attackers deface Web sites, their techniques, and their tricks.
• Chapter 10, E-Shoplifting—discusses how attackers commit online shoplifting by tricking an application to give them merchandise at a lower price.
• Chapter 11, Database Access—discusses how attackers break into Web applications through the database.
• Chapter 12, Java: Remote Command Execution—discusses how attackers use Java as a mechanism for breaking into a system.
• Chapter 13, Impersonation—discusses how an attacker can take on another user’s identity.
• Chapter 14, Buffer Overflows: On-the-Fly—discusses how an attacker can identify and create overflows in an application.
Part Four, Advanced Web Kung Fu, contains the final three chapters.
• Chapter 15, Web Hacking: Automated Tools—discusses the tools and techniques that hackers use to perform many of their tricks in an automated fashion.
• Chapter 16, Worms—discusses the deadly worm and how it is created, propagated, and removed.
• Chapter 17, Beating the IDS—discusses how IDS can help and hurt a hunt for an attacker.

Web Hacking: Attacks and Defense


DISCLAIMER:

This site does not store Web Hacking: Attacks and Defense on its server. We only index and link to Web Hacking: Attacks and Defense provided by other sites. Please contact the content providers to delete Web Hacking: Attacks and Defense if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches