Wiley Web Application Defenders Cookbook

seeders: 21
leechers: 5
Added on July 7, 2014 by appu1991in Books > Ebooks
Torrent verified.



Wiley Web Application Defenders Cookbook (Size: 14.64 MB)
 Wiley.Web.Application.Defenders.Cookbook.Dec.2012.pdf14.64 MB


Description

image

BOOK DESCRIPTION

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker’s Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender’s Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.

Each “recipe” shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more.

Provides practical tactics for detecting web attacks and malicious behavior and defending against them
Written by a preeminent authority on web application firewall technology and web application defense tactics
Offers a series of “recipes” that include working code examples for the open-source ModSecurity web application firewall module
Find the tools, techniques, and expert information you need to detect and respond to web application attacks with Web Application Defender’s Cookbook: Battling Hackers and Protecting Users.

TABLE OF CONTENTS

Part I - Preparing the Battle Space
Chapter 1. Application Fortification
Chapter 2. Vulnerability Identification and Remediation
Chapter 3. Poisoned Pawns (Hacker Traps)

Part II - Asymmetric Warfare
Chapter 4. Reputation and Third-Party Correlation
Chapter 5. Request Data Analysis
Chapter 6. Response Data Analysis
Chapter 7. Defending Authentication
Chapter 8. Defending Session State
Chapter 9. Preventing Application Attacks
Chapter 10. Preventing Client Attacks
Chapter 11. Defending File Uploads
Chapter 12. Enforcing Access Rate and Application Flows

Part III - Tactical Response
Chapter 13. Passive Response Actions
Chapter 14. Active Response Actions
Chapter 15. Intrusive Response Actions

Sharing Widget


Download torrent
14.64 MB
seeders:21
leechers:5
Wiley Web Application Defenders Cookbook