The tactics of attack and defense in the web application

Pay with:
i agree with "Terms for Customers"
Sold: 0

Content: text 31 symbols


The problems of detection, investigation, operation, eliminating vulnerabilities in software code, Web-based applications. We describe the most frequent vulnerability basic principles of writing secure code. Much attention is paid to the methods of protection of databases by SQL-injection. The different ways to build secure authorization system autifikatsii. Considered cross-site scripting (HSS) in terms of building a secure code to create chat rooms, forums, systems of access to e-mail through the Web-based interface, and others. Attention is paid to the issue of security protection systems when placing the site on serverehostingovoy company. The description of the virus, reproduce exclusively through vulnerabilities in Web-based applications. The material of the book is accompanied by numerous practical examples and recommendations.
The book is in pdf format
Download link to disk Yandex


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)