The Database Hacker's Handbook Defending Database
Title | The Database Hacker's Handbook Defending Database PDF eBook |
Author | David Litchfield Chris Anley John Heasman Bill Gri |
Publisher | John Wiley & Sons |
Pages | 516 |
Release | |
Genre | |
ISBN | 9788126506156 |
The Database Hacker's Handbook
Title | The Database Hacker's Handbook PDF eBook |
Author | David Litchfield |
Publisher | John Wiley & Sons |
Pages | 536 |
Release | 2005-07-14 |
Genre | Computers |
ISBN |
This handbook covers how to break into and how to defend the most popular database server software.
The Web Application Hacker's Handbook
Title | The Web Application Hacker's Handbook PDF eBook |
Author | Dafydd Stuttard |
Publisher | John Wiley & Sons |
Pages | 770 |
Release | 2011-03-16 |
Genre | Computers |
ISBN | 1118079612 |
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.
The Hacker's Handbook
Title | The Hacker's Handbook PDF eBook |
Author | Susan Young |
Publisher | CRC Press |
Pages | 896 |
Release | 2003-11-24 |
Genre | Business & Economics |
ISBN | 0203490045 |
This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.
The Database Hacker's Handbook
Title | The Database Hacker's Handbook PDF eBook |
Author | David Litchfield |
Publisher | Wiley Publishing |
Pages | 529 |
Release | 2014-05-14 |
Genre | Computer networks |
ISBN | 9781461919254 |
This handbook covers how to break into and how to defend the most popular database server software.
The Mobile Application Hacker's Handbook
Title | The Mobile Application Hacker's Handbook PDF eBook |
Author | Dominic Chell |
Publisher | John Wiley & Sons |
Pages | 816 |
Release | 2015-06-11 |
Genre | Computers |
ISBN | 1118958527 |
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.
The Shellcoder's Handbook
Title | The Shellcoder's Handbook PDF eBook |
Author | Chris Anley |
Publisher | John Wiley & Sons |
Pages | 758 |
Release | 2011-02-16 |
Genre | Computers |
ISBN | 1118079124 |
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files