Web Application Obfuscation

Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems.

Web Application Obfuscation

Author: Mario Heiderich

Publisher: Elsevier

ISBN: 1597496049

Page: 275

View: 167

Introduction -- HTML -- JavaScript and VBScript -- Nonalphanumeric JavaScript -- CSS -- PHP -- SQL -- Web application firewalls and client-side filters -- Mitigating bypasses and attacks -- Future developments.

Related Books:

Web Application Obfuscation
Language: un
Pages: 275
Authors: Mario Heiderich
Categories: Computers
Type: BOOK - Published: 2011 - Publisher: Elsevier

Introduction -- HTML -- JavaScript and VBScript -- Nonalphanumeric JavaScript -- CSS -- PHP -- SQL -- Web application firewalls and client-side filters -- Mitigating bypasses and attacks -- Future developments.
Web Application Obfuscation
Language: un
Pages:
Authors: Mario Heiderich
Categories: Application software
Type: BOOK - Published: 2011 - Publisher:

Books about Web Application Obfuscation
Web Application Obfuscation
Language: un
Pages: 275
Authors: Mario Heiderich
Categories: Application software
Type: BOOK - Published: 2011 - Publisher:

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a
Hacking .NET
Language: un
Pages: 320
Authors: Robert Simon
Categories: Computers
Type: BOOK - Published: 2015-11-15 - Publisher: Newnes

Hacking .NET: Reversing Code Obfuscation provides you with the knowledge and tools necessary to reverse engineer obfuscated .NET applications. The book examines many of the common techniques used by commercial obfuscators and explains, in detail, methods for detecting and circumventing obfuscations ranging from automated tools to manual techniques. This book
Information Security The Complete Reference, Second Edition
Language: en
Pages: 896
Authors: Mark Rhodes-Ousley
Categories: Computers
Type: BOOK - Published: 2013-04-03 - Publisher: McGraw Hill Professional

Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral