Hello Reader
Books in your Cart

The Web Application Hacker\'s Handbook: Finding and Exploiting Security Flaws, 2ed

The Web Application Hacker\'s Handbook: Finding and Exploiting Security Flaws, 2ed
-15 % Out Of Stock

Advertisement

Subscribe to us!

The Web Application Hacker\'s Handbook: Finding and Exploiting Security Flaws, 2ed
Currently Unavailable
This Product is Out of Stock. We will update for the availability.
  • Stock Status: Out Of Stock
  • Sold by Wiley India
  • Seller Rating:    0 Reviews
  • Contact Seller
  • Publisher: Wiley
  • ISBN-13:  9788126533404
  • Total Pages:  912 Pages
  • Book Language:  English
  • Available Book Formats: Paperback
No. Of Views: 988
₹679
₹799
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. ..
Pustak Details
Sold ByWiley India
AuthorDafydd Stuttard, Marcus Pinto
ISBN-139788126533404
FormatPaperback
LanguageEnglish
Pages912 Pages
CategoryCOMPUTERS/SECURITY

Reviews

Write a review

Note: HTML is not translated!
Bad Good
Captcha

Book Description

The Web Application Hacker\'s Handbook: Finding and Exploiting Security Flaws, 2ed

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.
Raise your Query?
Let's help