eBooks-it.org Logo
eBooks-IT.org Inner Image

How to Attack and Defend Your Website

How to Attack and Defend Your Website Image

Book Details:

Publisher:Syngress Media,U.S.
Series: Syngress , How To
Author:Henry Dalziel
Edition:1
ISBN-10:0128027320
ISBN-13:9780128027325
Pages:76
Published:Dec 18 2014
Posted:Apr 20 2016
Language:English
Book format:PDF
Book size:6.92 MB

Book Description:

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages. * Learn the basics of penetration testing so that you can test your own website's integrity and security* Discover useful tools such as Burp Suite, DVWA, and SQLMap* Gain a deeper understanding of how your website works and how best to protect it

Download Link:

Related Books:

Attack and Defend Computer Security Set

Attack and Defend Computer Security Set Image
Defend your networks and data from attack with this unique two-book security setThe Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker's Handbook and Malware Analyst's Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves.The Web Application Hacker's Handbook takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends ...

Building Websites with VB.NET and DotNetNuke 4

A practical guide to creating and maintaining your own DotNetNuke website, and developing new modules and skins
Building Websites with VB.NET and DotNetNuke 4 Image
This renowned book is your indispensable guide to creating content-rich websites with DotNetNuke, as quickly as possible. This is the only book to provide in-depth coverage of the DAL+, an extended feature set of the DotNetNuke Data Access Layer (DAL) introduced in version 4.3 of DotNetNuke that makes developing custom modules fast and easy. This book has been written for both the beginner wanting to set up a website and also ASP.NET developers with a grasp of VB.NET who want a deeper understanding of how to work with DotNetNuke. To work with the DotNetNuke code, you will need access to Visual Web Developer Express or Visual Studio .NET 2005. No prior knowledge of DotNetNuke is assumed....

The Microsoft Outlook Ideas Book

How to Organise and manage yourself, your team, and your activities with Outlook and Exchange
The Microsoft Outlook Ideas Book Image
A fast-paced guide for instruction and inspiration on creating powerful solutions for small businesses and organizations using Outlook. Throw away your other applications, and learn to use Outlook in practical ways that you never imagined possible! This book is for users who are comfortable with the basic functions of Outlook, but who want inspiration and direction on manipulating its features to produce powerful methods of viewing, presenting and reporting the wealth of information that it can hold. Users of Microsoft Access and Excel will recognize the functions and constructs used in some of the examples. The techniques in this book are applicable to all versions of Outlook from 2000 upwards. Where there are functional differences between the vers...



2007 - 2021 © eBooks-IT.org