TY - BOOK AU - McClure,Stuart AU - Shah,Saumil AU - Shah,Shreeraj TI - Web hacking: attacks and defense SN - 0201761769 (pbk.) PY - 2003/// CY - Boston PB - Addison-Wesley KW - Computer networks KW - Security measures KW - Web sites KW - Computer security N1 - Includes bibliographical references and index; Pt. 1; The E-Commerce Playground --; Ch. 1; Web Languages: The Babylon of the 21st Century --; Ch. 2; Web and Database Servers --; Ch. 3; Shopping Carts and Payment Gateways --; Ch. 4; HTTP and HTTPS: The Hacking Protocols --; Ch. 5; URL: The Web Hacker's Sword --; Pt. 2; URLs Unraveled --; Ch. 6; Web: Under (the) Cover --; Ch. 7; Reading Between the Lines --; Ch. 8; Site Linkage Analysis --; Pt. 3; How Do They Do It? --; Ch. 9; Cyber Graffiti --; Ch. 10; E-Shoplifting --; Ch. 11; Database Access --; Ch. 12; Java: Remote Command Execution --; Ch. 13; Impersonation --; Ch. 14; Buffer Overflowers: On-the-Fly --; Pt. 4; Advanced Web Kung Fu --; Ch. 15; Web Hacking: Automated Tools --; Ch. 16; Worms --; Ch. 17; Beating the IDS; App. A; Web and Database Port Listing --; App. B; HTTP/1.1 and HTTP/1.0 Method and Field Definitions --; App. C; Remote Command Execution Cheat Sheet --; App. D; Source Code, File, and Directory Disclosure Cheat Sheet --; App. E; Resources and Links --; App. F; Web-Related Tools ER -