Developer's Guide to Web Application Security

Author: Cross   Michael  

Publisher: Elsevier Science‎

Publication year: 2011

E-ISBN: 9780080504094

P-ISBN(Paperback): 9781597490610

P-ISBN(Hardback):  9781597490610

Subject: TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential.

  • The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002
  • Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more

Chapter

What Motivates a Hacker?

Understanding Current Attack Types

Recognizing Web Application Security Threats

Preventing Break-Ins by Thinking like a Hacker

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 2. How to Avoid Becoming a Code Grinder

Introduction

What Is a Code Grinder?

Thinking Creatively when Coding

Security from the Perspective of a Code Grinder

Building Functional and Secure Web Applications

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 3. Understanding the Risk Associated with Mobile Code

Introduction

Recognizing the Impact of Mobile Code Attacks

Identifying Common Forms of Mobile Code

Protecting Your System from Mobile Code Attacks

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4. Vulnerable CGI Scripts

Introduction

What Is a CGI Script, and What Does It Do?

Break-Ins Resulting from Weak CGI Scripts

Languages for Writing CGI Scripts

Advantages of Using CGI Scripts

Rules for Writing Secure CGI Scripts

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 5. Hacking Techniques and Tools

Introduction

A Hacker’s Goals

The Five Phases of Hacking

Defacing Web Sites

Social Engineering

The Intentional “Back Door”Attack

Exploiting Inherent Weaknesses in Code or Programming Environments

The Tools of the Trade

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 6. Code Auditing and Reverse Engineering

Introduction

How to Efficiently Trace through a Program

Auditing and Reviewing Selected Programming Languages

Looking for Vulnerabilities

Pulling It All Together

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 7. Securing Your Java Code

Introduction

Overview of the Java Security Architecture

How Java Handles Security

Potential Weaknesses in Java

Coding Functional but Secure Java Applets

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 8. Securing XML

Introduction

Defining XML

Creating Web Applications Using XML

The Risks Associated with Using XML

Securing XML

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 9. Building Safe ActiveX Internet Controls

Introduction

Dangers Associated with Using ActiveX

Methodology for Writing Safe ActiveX Controls

Securing ActiveX Controls

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 10. Securing ColdFusion

Introduction

How Does ColdFusion Work?

Preserving ColdFusion Security

ColdFusion Application Processing

Risks Associated with Using ColdFusion

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 11. Developing Security-Enabled Applications

Introduction

The Benefits of Using Security-Enabled Applications

Types of Security Used in Applications

Reviewing the Basics of PKI

Using PKI to Secure Web Applications

Implementing PKI in Your Web Infrastructure

Testing Your Security Implementation

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 12. Cradle to Grave: Working with a Security Plan

Introduction

Examining Your Code

Being Aware of Code Vulnerabilities

Using Common Sense when Coding

Creating a Security Plan

Summary

Solutions Fast Track

Frequently Asked Questions

Index

The users who browse this book also browse