CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

By: Contributor(s): Material type: TextTextPublication details: Boston : Addison-Wesley, c2003.Description: xxxi, 492 p. : ill. ; 24 cmISBN:
  • 0201761769 (pbk.)
  • 9788177582314
Subject(s):
Contents:
Pt. 1. The E-Commerce Playground -- Ch. 1. Web Languages: The Babylon of the 21st Century -- Ch. 2. Web and Database Servers -- Ch. 3. Shopping Carts and Payment Gateways -- Ch. 4. HTTP and HTTPS: The Hacking Protocols -- Ch. 5. URL: The Web Hacker's Sword -- Pt. 2. URLs Unraveled -- Ch. 6. Web: Under (the) Cover -- Ch. 7. Reading Between the Lines -- Ch. 8. Site Linkage Analysis -- Pt. 3. How Do They Do It? -- Ch. 9. Cyber Graffiti -- Ch. 10. E-Shoplifting -- Ch. 11. Database Access -- Ch. 12. Java: Remote Command Execution -- Ch. 13. Impersonation -- Ch. 14. Buffer Overflowers: On-the-Fly -- Pt. 4. Advanced Web Kung Fu -- Ch. 15. Web Hacking: Automated Tools -- Ch. 16. Worms -- Ch. 17. Beating the IDS. App. A. Web and Database Port Listing -- App. B. HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- App. C. Remote Command Execution Cheat Sheet -- App. D. Source Code, File, and Directory Disclosure Cheat Sheet -- App. E. Resources and Links -- App. F. Web-Related Tools.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
Books Books Central Library, KUET General Stacks 005.8 MCC (Browse shelf(Opens below)) 1 Available 3010044037
Total holds: 0

Includes bibliographical references and index.

Pt. 1. The E-Commerce Playground -- Ch. 1. Web Languages: The Babylon of the 21st Century -- Ch. 2. Web and Database Servers -- Ch. 3. Shopping Carts and Payment Gateways -- Ch. 4. HTTP and HTTPS: The Hacking Protocols -- Ch. 5. URL: The Web Hacker's Sword -- Pt. 2. URLs Unraveled -- Ch. 6. Web: Under (the) Cover -- Ch. 7. Reading Between the Lines -- Ch. 8. Site Linkage Analysis -- Pt. 3. How Do They Do It? -- Ch. 9. Cyber Graffiti -- Ch. 10. E-Shoplifting -- Ch. 11. Database Access -- Ch. 12. Java: Remote Command Execution -- Ch. 13. Impersonation -- Ch. 14. Buffer Overflowers: On-the-Fly -- Pt. 4. Advanced Web Kung Fu -- Ch. 15. Web Hacking: Automated Tools -- Ch. 16. Worms -- Ch. 17. Beating the IDS. App. A. Web and Database Port Listing -- App. B. HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- App. C. Remote Command Execution Cheat Sheet -- App. D. Source Code, File, and Directory Disclosure Cheat Sheet -- App. E. Resources and Links -- App. F. Web-Related Tools.

There are no comments on this title.

to post a comment.

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh