WEB APPLICATION OBFUSCATION

Download
File
9781597496049_Chap09_Web_App.pdf
9781597496049Chap03_Web_App.pdf

Web Application Obfuscation

By Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay

Publisher: Syngress

December 2010 U.S.,  January 2011 EMEA

www.syngress.com

Description

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker’s perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.

    • Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets

    • Evaluates Web application vulnerabilties from the attacker’s perspective and explains how these very systems introduce new types of vulnerabilities

    • Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more


Download
File
9781597496049_Chap09_Web_App.pdf
9781597496049Chap03_Web_App.pdf

April 19, 2022
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.