Hacking exposed : (Record no. 474)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01214cam a22002654a 4500 |
001 - CONTROL NUMBER | |
control field | 1702 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200702105245.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 070822s2006 nyua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780070619807 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | S2831 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Scambray, Joel. |
245 10 - TITLE STATEMENT | |
Title | Hacking exposed : |
Remainder of title | Web applications / |
Statement of responsibility, etc | Joel Scambray, Mike Shema, Caleb Sima. Foreword by Jeremiah Grossman. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Tata McGraw-Hill, |
Date of publication, distribution, etc | 2006 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxix, 520 p. |
Other physical details | ill. ; |
Dimensions | 23 cm. |
500 ## - GENERAL NOTE | |
General note | Includes bibliographic references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Web sites |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shema, Mike. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sima, Caleb. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Hacking Web apps 101 ;<br/>2. Profiling ;<br/>3. Hacking Web platforms ;<br/>4. Attacking Web authentication ;<br/>5. Attacking Web authorization ;<br/>6. Input validation attacks ;<br/>7. Attacking Web datastores ;<br/>8. Attacking XML Web services ;<br/>9. Attacking Web application management ;<br/>10. Hacking Web clients ;<br/>11. Denial-of-service (dos) attacks ;<br/>12. Full-knowledge analysis ;<br/>13. Web application security scanners.<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 06.06.2018 | U.E. | 005.8 S2831 | T1702 | 27.11.2023 | 06.06.2018 | Books |