Hack Proofing Your Web Applications: The Only Way to Stop a Hacker Is to Think Like One

Front Cover
Elsevier, Jun 18, 2001 - Computers - 512 pages
From the authors of the bestselling Hack Proofing Your Network!

OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure?

Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.

Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs
Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs
 

What people are saying - Write a review

User Review - Flag as inappropriate

for free download
https://docs.google.com/file/d/0B_kByxogrYC-dzNwNWNhYjMzMU0/view

Contents

Chapter 2 How to Avoid Becoming a Code Grinder
43
Chapter 3 Understanding the Risks Associated with Mobile Code
81
Chapter 4 Vulnerable CGI Scripts
125
Chapter 5 Hacking Techniques and Tools
167
Chapter 6 Code Auditing and Reverse Engineering
215
Chapter 7 Securing Your Java Code
253
Chapter 8 Securing XML
331
Chapter 9 Building Safe ActiveX Internet Controls
371
Chapter 10 Securing ColdFusion
403
Chapter 11 Developing SecurityEnabled Applications
451
Working with a Security Plan
499
Appendix Hack Proofing Your Web Applications Fast Track
533
Index
561
Related Titles
596
Copyright

Common terms and phrases

Popular passages

Page v - John, and the team at Callisma for their invaluable insight into the challenges of designing, deploying, and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson, and FridaYara of Publishers Group West for sharing their incredible marketing experience and expertise.
Page v - Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow...
Page 21 - Worms use facilities of an operating system that are meant to be automatic and invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, which then slows or halts other tasks. Some worms in existence not only are self-replicating, but also contain a malicious payload.
Page 19 - ... target machine into doing so. Hence, the reason why this server application is commonly disguised as a Trojan horse. After the server application has been installed, the client machine can transfer files to and from the target machine, execute an application on the target machine, restart or lock up the target machine, and log keystrokes from the target machine. All of these operations are of value to a hacker. The server application is a single executable file, just over 122 kilobytes in size....

Bibliographic information