Attack and Defend Computer Security Set

Attack and Defend Computer Security Set
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 87,70 €

Jetzt 57,99 €* E-Book

Artikel-Nr:
9781118906774
Veröffentl:
2014
Einband:
E-Book
Seiten:
1656
Autor:
Dafydd Stuttard
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker s Handbook and Malware Analyst s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves. The Web Application Hacker's Handbook takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends and threats, this guide covers remoting frameworks, HTML5, and cross-domain integration techniques along with clickjacking, framebusting, HTTP parameter pollution, XML external entity injection, hybrid file attacks, and more. The Malware Analyst's Cookbook includes a book and DVD and is designed to enhance the analytical capabilities of anyone who works with malware. Whether you re tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you go beyond the basic tools for tackling security challenges to cover how to extend your favorite tools or build your own from scratch using C, Python, and Perl source code. The companion DVD features all the files needed to work through the recipes in the book and to complete reverse-engineering challenges along the way. The Attack and Defend Computer Security Set gives your organization the security tools needed to sound the alarm and stand your ground against malicious threats lurking online.
Defend your networks and data from attack with this uniquetwo-book security setThe Attack and Defend Computer Security Set is a two-bookset comprised of the bestselling second edition of WebApplication Hacker's Handbook and MalwareAnalyst's Cookbook. This special security bundle combinescoverage of the two most crucial tactics used to defend networksapplications, and data from attack while giving securityprofessionals insight into the underlying details of these attacksthemselves.The Web Application Hacker's Handbook takes a broad lookat web application security and exposes the steps a hacker can taketo attack an application, while providing information on how theapplication can defend itself. Fully updated for the latestsecurity trends and threats, this guide covers remoting frameworksHTML5, and cross-domain integration techniques along withclickjacking, framebusting, HTTP parameter pollution, XML externalentity injection, hybrid file attacks, and more.The Malware Analyst's Cookbook includes a book and DVDand is designed to enhance the analytical capabilities of anyonewho works with malware. Whether you're tracking a Trojanacross networks, performing an in-depth binary analysis, orinspecting a machine for potential infections, the recipes in thisbook will help you go beyond the basic tools for tackling securitychallenges to cover how to extend your favorite tools or build yourown from scratch using C, Python, and Perl source code. Thecompanion DVD features all the files needed to work through therecipes in the book and to complete reverse-engineering challengesalong the way.The Attack and Defend Computer Security Set gives yourorganization the security tools needed to sound the alarm and standyour ground against malicious threats lurking online.
WEB APPLICATION HACKER'S HANDBOOK 2EChapter 1: Web Application (In)security 1Chapter 2: Core Defense Mechanisms 17Chapter 3: Web Application Technologies 39Chapter 4: Mapping the Application 73Chapter 5: Bypassing Client-Side Controls 117Chapter 6: Attacking Authentication 159Chapter 7: Attacking Session Management 205Chapter 8: Attacking Access Controls 257Chapter 9: Attacking Data Stores 287Chapter 10: Attacking Back-End Components 357Chapter 11: Attacking Application Logic 405Chapter 12: Attacking Users: Cross-Site Scripting 431Chapter 13: Attacking Users: Other Techniques 501Chapter 14: Automating Customized Attacks 571Chapter 15: Exploiting Information Disclosure 615Chapter 16: Attacking Native Compiled Applications 633Chapter 17: Attacking Application Architecture 647Chapter 18: Attacking the Application Server 669Chapter 19: Finding Vulnerabilities in Source Code 701Chapter 20: A Web Application Hacker's Toolkit 747Chapter 21: A Web Application Hacker's Methodology 791MALWARE ANALYST'S COOKBOOK AND DVDChapter 1: Anonymizing Your Activities 1Chapter 2: Honeypots 27Chapter 3: Malware Classifi cation 51Chapter 4: Sandboxes and Multi-AV Scanners 89Chapter 5: Researching Domains and IP Addresses 119Chapter 6: Documents, Shellcode, and URLs 155Chapter 7: Malware Labs 211Chapter 8: Automation 239Chapter 9: Dynamic Analysis 283Chapter 10: Malware Forensics 337Chapter 11: Debugging Malware 395Chapter 12: De-Obfuscation 441Chapter 13: Working with DLLs 487Chapter 14: Kernel Debugging 511Chapter 15: Memory Forensics with Volatility 571Chapter 16: Memory Forensics: Code Injection and Extraction 601Chapter 17: Memory Forensics: Rootkits 637Chapter 18: Memory Forensics: Network and Registry 673

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.