Web Application Obfuscation - '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' (Paperback)

, , ,

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. "Web Application Obfuscation "takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assetsEvaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilitiesTeaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more


R895
List Price R1,075
Save R180 17%

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles8950
Mobicred@R84pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 12 - 17 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. "Web Application Obfuscation "takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assetsEvaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilitiesTeaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Syngress Media,U.S.

Country of origin

United States

Release date

2011

Availability

Expected to ship within 12 - 17 working days

First published

December 2010

Authors

, , ,

Dimensions

235 x 191 x 15mm (L x W x T)

Format

Paperback

Pages

296

ISBN-13

978-1-59749-604-9

Barcode

9781597496049

Categories

LSN

1-59749-604-9



Trending On Loot