The Web Application Hacker’s Handbook. Finding and Exploiting Security Flaws, Książki

[ Pobierz całość w formacie PDF ]
//-->CONTENTSWEB APPLICATION HACKER’S HANDBOOK 2EChapter 1: Web Application (In)securityChapter 2: Core Defense MechanismsChapter 3: Web Application TechnologiesChapter 4: Mapping the ApplicationChapter 5: Bypassing Client-Side ControlsChapter 6: Attacking AuthenticationChapter 7: Attacking Session ManagementChapter 8: Attacking Access ControlsChapter 9: Attacking Data StoresChapter 10: Attacking Back-End ComponentsChapter 11: Attacking Application LogicChapter 12: Attacking Users: Cross-Site ScriptingChapter 13: Attacking Users: Other TechniquesChapter 14: Automating Customized AttacksChapter 15: Exploiting Information DisclosureChapter 16: Attacking Native Compiled ApplicationsChapter 17: Attacking Application ArchitectureChapter 18: Attacking the Application ServerChapter 19: Finding Vulnerabilities in Source CodeChapter 20: A Web Application Hacker’s ToolkitChapter 21: A Web Application Hacker’s MethodologyMALWARE ANALYST’S COOKBOOK AND DVD1173973117159205257287357405431501571615633647669701747791Chapter 1: Anonymizing Your ActivitiesChapter 2: HoneypotsChapter 3: Malware ClassificationChapter 4: Sandboxes and Multi-AV ScannersChapter 5: Researching Domains and IP AddressesChapter 6: Documents, Shellcode, and URLsChapter 7: Malware LabsChapter 8: Automation1275189119155211239CONTENTSChapter 9: Dynamic AnalysisChapter 10: Malware ForensicsChapter 11: Debugging MalwareChapter 12: De-ObfuscationChapter 13: Working with DLLsChapter 14: Kernel DebuggingChapter 15: Memory Forensics with VolatilityChapter 16: Memory Forensics: Code Injection and ExtractionChapter 17: Memory Forensics: RootkitsChapter 18: Memory Forensics: Network and Registry283337395441487511571601637673ii [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • shinnobi.opx.pl
  •