Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Application Obfuscation

Buy

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.

  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets
  • Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities
  • Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more
(HTML tags aren't allowed.)

Practical TLA+: Planning Driven Development
Practical TLA+: Planning Driven Development
Learn how to design complex, correct programs and fix problems before writing a single line of code. This book is a practical, comprehensive resource on TLA+ programming with rich, complex examples. Practical TLA+ shows you how to use TLA+ to specify a complex system and test the design itself for...
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Verification and Validation for Quality of UML 2.0 Models
Verification and Validation for Quality of UML 2.0 Models
A practical approach to enhancing quality in software models using UML Version 2.0

"Despite its increasing usage, many companies are not taking the best advantage of UML and, occasionally, individuals have experienced frustration in applying its standards. Perhaps this is because they have not yet read this book!"
...


Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and...

Microsoft Access Version 2002 Inside Out
Microsoft Access Version 2002 Inside Out

Whether you’re a new user of Microsoft Access or an experienced Access database developer, you’ll find a number of solid improvements in Access 2002. With an eye toward enhancements both in form and function, the changes in Access make working with the interface more intuitive than ever; extend the reach of your data by giving...

Practical Formal Software Engineering: Wanting the Software You Get
Practical Formal Software Engineering: Wanting the Software You Get
Practical Formal Software Engineering is a textbook aimed at final year undergraduate and graduate students, emphasizing formal methods in writing robust code quickly. Engineering is an informal process using formal logics as tools and components to obtain timely practical solutions. This book takes an engineering approach to illuminate the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy