Web Application Defender's Cookbook : Battling Hackers and Protecting Users.

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book:...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Barnett, Ryan C.
Format: eBook
Language:English
Published: Indianapolis, Ind. : Wiley Pub., Inc., 2013.
Edition:1. ed.
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 b10287468
006 m o d
007 cr |||||||||||
008 130502s2013 inua ob 001 0 eng d
005 20240829144556.6
016 7 |a 016162686  |2 Uk 
019 |a 823719322  |a 828678288  |a 844973133  |a 865012359  |a 879653122  |a 883144846  |a 961567586  |a 962678167  |a 988438818  |a 992016703  |a 1026439361  |a 1037793837  |a 1038588489  |a 1045505368  |a 1055407574  |a 1065982782  |a 1081209616  |a 1083554106  |a 1103268537  |a 1105724949  |a 1114380747  |a 1129373491  |a 1132915980  |a 1142772821  |a 1153045255  |a 1192348905  |a 1228590167  |a 1240508715 
020 |a 9781118362181  |q (pbk. ;  |q alk. paper) 
020 |a 1118362187  |q (pbk. ;  |q alk. paper) 
020 |a 9781118568712  |q (e-book) 
020 |a 1118568710  |q (e-book) 
020 |a 9781118417058  |q (electronic bk.) 
020 |a 1118417054  |q (electronic bk.) 
020 |a 9781118568651  |q (ebk) 
020 |a 1118568656  |q (ebk) 
028 0 1 |a EB00066819  |b Recorded Books 
029 1 |a AU@  |b 000052281586 
029 1 |a AU@  |b 000053029717 
029 1 |a CHNEW  |b 000600015 
029 1 |a DEBBG  |b BV041430551 
029 1 |a DEBBG  |b BV041913049 
029 1 |a DEBBG  |b BV044049896 
029 1 |a DEBSZ  |b 397460872 
029 1 |a DEBSZ  |b 398263418 
029 1 |a GBVCP  |b 1014934486 
029 1 |a GBVCP  |b 785368531 
029 1 |a NZ1  |b 14977012 
029 1 |a AU@  |b 000055885477 
035 |a (OCoLC)safo841481395 
035 |a (OCoLC)841481395  |z (OCoLC)823719322  |z (OCoLC)828678288  |z (OCoLC)844973133  |z (OCoLC)865012359  |z (OCoLC)879653122  |z (OCoLC)883144846  |z (OCoLC)961567586  |z (OCoLC)962678167  |z (OCoLC)988438818  |z (OCoLC)992016703  |z (OCoLC)1026439361  |z (OCoLC)1037793837  |z (OCoLC)1038588489  |z (OCoLC)1045505368  |z (OCoLC)1055407574  |z (OCoLC)1065982782  |z (OCoLC)1081209616  |z (OCoLC)1083554106  |z (OCoLC)1103268537  |z (OCoLC)1105724949  |z (OCoLC)1114380747  |z (OCoLC)1129373491  |z (OCoLC)1132915980  |z (OCoLC)1142772821  |z (OCoLC)1153045255  |z (OCoLC)1192348905  |z (OCoLC)1228590167  |z (OCoLC)1240508715 
037 |a safo9781118417058 
040 |a DKDLA  |b eng  |e pn  |c DKDLA  |d OCLCO  |d LLB  |d E7B  |d IDEBK  |d OCLCF  |d N$T  |d TEFOD  |d YDXCP  |d UKMGB  |d UMI  |d OCLCA  |d OCLCO  |d EBLCP  |d STF  |d B24X7  |d COO  |d DEBSZ  |d RECBK  |d OCLCO  |d TEFOD  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d NKT  |d OCLCQ  |d OCLCO  |d AZK  |d CNNLC  |d OCLCO  |d MOR  |d CCO  |d PIFAG  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d ZCU  |d OCLCA  |d U3W  |d OCLCA  |d COCUF  |d REB  |d CEF  |d WRM  |d OCLCQ  |d KSU  |d NRAMU  |d ICG  |d INT  |d DEBBG  |d VT2  |d OCLCQ  |d WYU  |d S9I  |d OCLCQ  |d UAB  |d A6Q  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d U@J  |d OCLCQ  |d BOL  |d UKCRE  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a GWRE 
050 4 |a QA76.9.A25  |b B37 2013eb 
100 1 |a Barnett, Ryan C. 
245 1 0 |a Web Application Defender's Cookbook :  |b Battling Hackers and Protecting Users. 
250 |a 1. ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub., Inc.,  |c 2013. 
300 |a 1 online resource (xxix, 522 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
340 |g polychrome.  |2 rdacc  |0 http://rdaregistry.info/termList/RDAColourContent/1003 
347 |a data file 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Part I: Preparing the Battle Space; Chapter 1: Application Fortification; Recipe 1-1: Real-time Application Profiling; Recipe 1-2: Preventing Data Manipulation with Cryptographic Hash Tokens; Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS); Recipe 1-4: Integrating Intrusion Detection System Signatures; Recipe 1-5: Using Bayesian Attack Payload Detection; HTTP Audit Logging; Recipe 1-6: Enable Full HTTP Audit Logging; Recipe 1-7: Logging Only Relevant Transactions; Recipe 1-9: Obscuring Sensitive Data in Logs. 
505 8 |a Recipe 1-10: Sending Alerts to a Central Log Host Using SyslogRecipe 1-11: Using the ModSecurity AuditConsole; Recipe 1-8: Ignoring Requests for Static Content; Chapter 2: Vulnerability Identification and Remediation; Internally Developed Applications; Externally Developed Applications; Virtual Patching; Recipe 2-1: Passive Vulnerability Identification; Active Vulnerability Identification; Recipe 2-2: Active Vulnerability Identification; Manual Vulnerability Remediation; Recipe 2-3: Manual Scan Result Conversion; Recipe 2-4: Automated Scan Result Conversion. 
505 8 |a Recipe 2-5: Real-time Resource Assessments and Virtual PatchingChapter 3: Poisoned Pawns (Hacker Traps); Honeytrap Concepts; Recipe 3-1: Adding Honeypot Ports; Recipe 3-2: Adding Fake robots.txt Disallow Entries; Recipe 3-3: Adding Fake HTML Comments; Recipe 3-4: Adding Fake Hidden Form Fields; Recipe 3-5: Adding Fake Cookies; Part II: Asymmetric Warfare; Chapter 4: Reputation and Third-Party Correlation; Suspicious Source Identification; Recipe 4-1: Analyzing the Client's Geographic Location Data; Recipe 4-2: Identifying Suspicious Open Proxy Usage. 
505 8 |a Recipe 4-3: Utilizing Real-time Blacklist Lookups (RBL)Recipe 4-4: Running Your Own RBL; Recipe 4-5: Detecting Malicious Links; Chapter 5: Request Data Analysis; Request Data Acquisition; Recipe 5-1: Request Body Access; Recipe 5-2: Identifying Malformed Request Bodies; Recipe 5-3: Normalizing Unicode; Recipe 5-4: Identifying Use of Multiple Encodings; Recipe 5-5: Identifying Encoding Anomalies; Input Validation Anomalies; Recipe 5-6: Detecting Request Method Anomalies; Recipe 5-7: Detecting Invalid URI Data; Recipe 5-8: Detecting Request Header Anomalies. 
505 8 |a Recipe 5-9: Detecting Additional ParametersRecipe 5-10: Detecting Missing Parameters; Recipe 5-11: Detecting Duplicate Parameter Names; Recipe 5-12: Detecting Parameter Payload Size Anomalies; Recipe 5-13: Detecting Parameter Character Class Anomalies; Chapter 6: Response Data Analysis; Recipe 6-1: Detecting Response Header Anomalies; Recipe 6-2: Detecting Response Header Information Leakages; Recipe 6-3: Response Body Access; Recipe 6-7: Detecting Source Code Leakages; Recipe 6-8: Detecting Technical Data Leakages; Recipe 6-9: Detecting Abnormal Response Time Intervals. 
520 |a Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Hackers. 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Web Application Defender's Cookbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGBxJvMb8b6v4QRPktd9tC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Barnett, Ryan C.  |t Web application defender's cookbook.  |d Indianapolis, Ind. : Wiley, ©2013  |z 9781118362181  |w (OCoLC)795173848 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9781118417058/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
936 |a BATCHLOAD 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i bbe72a44-0d38-59ac-ae77-7080ac3be0d0  |s 2553fb56-fb9c-5751-99d5-8ca989563c7d 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 B37 2013eb  |h Library of Congress classification  |i web  |n 1