31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
16 °P sammeln
31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
16 °P sammeln
Als Download kaufen
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
16 °P sammeln
Jetzt verschenken
31,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
16 °P sammeln
  • Format: PDF

While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. Youll learn methods for effectively researching and analyzing modern web applicationsincluding those you dont have direct access to. Youll also learn how to break into web…mehr

Produktbeschreibung
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. Youll learn methods for effectively researching and analyzing modern web applicationsincluding those you dont have direct access to. Youll also learn how to break into web applications using the latest hacking techniques. Finally, youll learn how to develop mitigations for use in your own web applications to protect against hackers.Explore common vulnerabilities plaguing today's web applicationsLearn essential hacking techniques attackers use to exploit applicationsMap and document web applications for which you dont have direct accessDevelop and deploy customized exploits that can bypass common defensesDevelop and deploy mitigations to protect your applications against hackersIntegrate secure coding best practices into your development lifecycleGet practical tips to help you improve the overall security of your web applications

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.