Shipping:
US$ 15.00
From China to U.S.A.
Seller: liu xing, Nanjing, JS, China
paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 288 Publisher: China Water Power Press Pub. Date :2009-05. Secret Web application attack techniques for all love the network security people. especially institutions of higher learning computer science students. Meanwhile. the Show Web application attack techniques can be used as a computer security training and school textbooks and reference books. but also for Web application developers and network managers a rare security reference materials. has a high practical value . Internet security has been deeply affected every corner of today s society. cyber crime. malicious network attacks are almost always played. which led to these problems is the greatest security risks come from the network core - web applications. Show Web application attack techniques to an instance method of combining with the theory. takes the reader along into the Web application security. so that readers personally play a security researcher. from understanding the Web application. Web structure began to understand. step by step into the Web application vulnerability analysis and technical analysis attacks. Show Web application attack techniques. Detail a variety of Web application attack techniques of classification and reason for the first time the reader has opened a Web application vulnerabilities to explore technology. meanwhile. cited a number of real Web application attacks case. for reference. More Contents: Preface Chapter 1 1.1 web application vulnerability so-called security definition of web application security vulnerabilities 1.2 1.2.1 1.2.2 vulnerabilities vulnerability characteristics of the concept of trust levels 1.2.4 1.2.3 System and System Vulnerability The relationship between attack 1.2.5 web application security vulnerabilities into 1.3 web application vulnerability caused by the classification of 1.4 for 1.5 web vulnerabilities before exploits the tendency of the worm 1.5.1 1.5.3 1.5.2 of malicious virus of 1.5. 4oday of Chapter 2 Basics 2.1 web - 2.1.1 What is the miracle of the world s operating principles 2.1.3web technology web2.1.2webFour Satisfaction guaranteed,or money back. Seller Inventory # J81371
Quantity: 10 available