Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,392
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 246
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
4361
-
4362
-
4363
-
4364Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Penetration Testing and Web Applications -- Proactive security testing -- Different testing methodologies -- Ethical hacking -- Penetration testing -- Vulnerability assessment -- Security audits -- Considerations when performing penetration testing -- Rules of Engagement -- The type and scope of testing -- Client contact details -- Client IT team notifications -- Sensitive data handling -- Status meeting and reports -- The limitations of penetration testing -- The need for testing web applications -- Reasons to guard against attacks on web applications -- Kali Linux -- A web application overview for penetration testers -- HTTP protocol -- Knowing an HTTP request and response -- The request header -- The response header -- HTTP methods -- The GET method -- The POST method -- The HEAD method -- The TRACE method -- The PUT and DELETE methods -- The OPTIONS method -- Keeping sessions in HTTP -- Cookies -- Cookie flow between server and client -- Persistent and nonpersistent cookies -- Cookie parameters -- HTML data in HTTP response -- The server-side code -- Multilayer web application -- Three-layer web application design -- Web services -- Introducing SOAP and REST web services -- HTTP methods in web services -- XML and JSON -- AJAX -- Building blocks of AJAX -- The AJAX workflow -- HTML5 -- WebSockets -- Summary -- Chapter 2: Setting Up Your Lab with Kali Linux -- Kali Linux -- Latest improvements in Kali Linux -- Installing Kali Linux -- Virtualizing Kali Linux versus installing it on physical hardware -- Installing on VirtualBox -- Creating the virtual machine -- Installing the system -- Important tools in Kali Linux -- CMS & -- Framework Identification -- WPScan -- JoomScan -- CMSmap…”
Libro electrónico -
4365Publicado 2023Tabla de Contenidos: “…. -- See also -- Testing for session hijacking -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 6: Validating (Data) Inputs - Part 1 -- Technical requirements -- Testing for reflected XSS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP verb tampering -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP Parameter Pollution (HPP) -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for SQL Injection -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
4366por Morón Lerma, Esther
Publicado 1999Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
4367
-
4368Publicado 2015Tabla de Contenidos: “…Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? …”
Libro electrónico -
4369
-
4370
-
4371
-
4372
-
4373
-
4374
-
4375
-
4376
-
4377
-
4378por Hucks, Tracey E., 1965-Tabla de Contenidos: “…Bring Something Different to Ifa": Indigenizing Yoruba Religious Cultures; Conclusion: "What We're Looking for in Africa Is Already Here": A Conclusion for the Twenty-first Century; Notes; Bibliography; Index; Back Cover…”
Publicado 2012
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
4379
-
4380Publicado 2021Libro