Ebook189 pages4 hours
Innocent Code: A Security Wake-Up Call for Web Programmers
Rating: 3.5 out of 5 stars
3.5/5
()
About this ebook
- This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them
- Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions
- Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other attacks that work because of missing pieces of code
- Shows developers how to change their mindset from Web site construction to Web site destruction in order to find dangerous code
Related to Innocent Code
Related ebooks
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers Rating: 4 out of 5 stars4/5iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsAsynchronous Circuit Design Rating: 0 out of 5 stars0 ratingsLegitimate Applications of Peer-to-Peer Networks Rating: 0 out of 5 stars0 ratingsWeb Services: Theory and Practice Rating: 0 out of 5 stars0 ratingsProgramming Mobile Devices: An Introduction for Practitioners Rating: 0 out of 5 stars0 ratingsSpoken, Multilingual and Multimodal Dialogue Systems: Development and Assessment Rating: 0 out of 5 stars0 ratingsImplementing Database Security and Auditing Rating: 4 out of 5 stars4/5Network Programming in .NET: With C# and Visual Basic .NET Rating: 3 out of 5 stars3/5SIP Security Rating: 0 out of 5 stars0 ratingsMiddleware for Communications Rating: 0 out of 5 stars0 ratingsInternet Security: Cryptographic Principles, Algorithms and Protocols Rating: 0 out of 5 stars0 ratingsSpeech Processing for IP Networks: Media Resource Control Protocol (MRCP) Rating: 0 out of 5 stars0 ratingsMicrosoft® Exchange Server 2003 Scalability with SP1 and SP2 Rating: 0 out of 5 stars0 ratingsMicrosoft Exchange Server 2003 Rating: 0 out of 5 stars0 ratingsNetwork Security: A Practical Approach Rating: 5 out of 5 stars5/5Agents Unleashed: A Public Domain Look at Agent Technology Rating: 0 out of 5 stars0 ratingsCellular Authentication for Mobile and Internet Services Rating: 0 out of 5 stars0 ratingsVoIP: Wireless, P2P and New Enterprise Voice over IP Rating: 0 out of 5 stars0 ratingsWindows Server 2003 Security Infrastructures: Core Security Features Rating: 0 out of 5 stars0 ratingsQuick Recipes on Symbian OS: Mastering C++ Smartphone Development Rating: 4 out of 5 stars4/5Dedicated Digital Processors: Methods in Hardware/Software Co-Design Rating: 0 out of 5 stars0 ratingsScalable Continuous Media Streaming Systems: Architecture, Design, Analysis and Implementation Rating: 0 out of 5 stars0 ratingsIM Instant Messaging Security Rating: 0 out of 5 stars0 ratingsSecure Computer and Network Systems: Modeling, Analysis and Design Rating: 0 out of 5 stars0 ratingsEmbedded SoPC Design with Nios II Processor and Verilog Examples Rating: 0 out of 5 stars0 ratingsDigital Data Integrity: The Evolution from Passive Protection to Active Management Rating: 0 out of 5 stars0 ratingsFirewalls: Jumpstart for Network and Systems Administrators Rating: 0 out of 5 stars0 ratingsMobile Inter-networking with IPv6: Concepts, Principles and Practices Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5
Reviews for Innocent Code
Rating: 3.6666667 out of 5 stars
3.5/5
3 ratings0 reviews
Book preview
Innocent Code - Sverre H. Huseby
Kd book_preview_excerpt.html
Enjoying the preview?
Page 1 of 1