Testing Web Security: Assessing the Security of Web Sites and Applications
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
application application’s approach attack automated browser buffer overflow CGI program Chapter Checklist YES client client-side command components compromised configuration management cookie database defenses detect device inventory documented policy downloaded dynamic code employees encryption example executed exploit firewall identified implemented input data installed Internet intruder IP address LAN administrator layer located machine mobile code network address network device network security policy network segments network traffic operating system organization organization’s password performance place that describes port potential production environment protected Protocol provide additional information request Sample List script security assessment security hole security testing security vulnerabilities security-testing team server server-side site’s source code specific strategy system software Table test environment test plan testers testing effort testing team thereby Tools NAME ASSOCIATED Trojan horse typically Unfortunately userIDs and passwords vendors Web application Web server www.microsoft.com YES NO DESCRIPTION