HACKING EXPOSED WEB APPLICATIONS, 3rd Edition et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 38,64
  • Tous les prix incluent la TVA.
Il ne reste plus que 3 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Ajouter au panier
Amazon rachète votre
article EUR 12,07 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

HACKING EXPOSED WEB APPLICATIONS, 3rd Edition (Anglais) Broché – 1 novembre 2010

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 38,64
EUR 27,07 EUR 15,17

Offres spéciales et liens associés

Produits fréquemment achetés ensemble

HACKING EXPOSED WEB APPLICATIONS, 3rd Edition + The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Acheter les articles sélectionnés ensemble

Vendez cet article - Prix de rachat jusqu'à EUR 12,07
Vendez HACKING EXPOSED WEB APPLICATIONS, 3rd Edition contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 12,07, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 6 commentaires
19 internautes sur 19 ont trouvé ce commentaire utile 
A good book, but lacking some of what I like about the HE series 1 avril 2011
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
This is the third Hacking Exposed: Web Applications (HE:WA) book I've reviewed, having reviewed the second edition in 2006 and the first edition in 2002. While I gave the earlier editions each five stars, I don't think HE:WA3E quite meets my expectations of a five star web application security book -- at least not one bearing the Hacking Exposed (HE) series name.

In my opinion, the winning formula for a good HE book was set by the first in the series, back in 1999: 1) explain a technology of interest; 2) show exactly how to exploit it; 3) recommend countermeasures. For me, these three steps MUST be followed, and any book with HE in the title that fails to follow this recipe is likely to fall flat. The reason I like this approach is simple; in many cases, defenders first encounter a new technology only after a researcher or intruder has broken it! In other words, the offensive side is usually far ahead of the defensive side, because offenders often specialize in a promising new area and pursue it relentlessly until they break it. Good HE books help redress this imbalance by getting the defender up to speed on a new technology, showing how to break it, and then suggesting defensive measures.

I believe that while HE:WA3E adopts some of this approach, it seems to not be consistently applied. In fact, I'm wondering if the absence of Mike Shema from the author team could be the reason for this change. Mike's handiwork still appears as a legacy of using older material, but elsewhere I found myself missing the HE formula.

For example, ch 9 seems to diverge from the HE recipe. It also seemed "light" to me compared to the prevalence of client-side exploitation. When HE:WA2E arrived in 2006, client-side attacks had been popular for about three years. I would have expected HE:WA3E (even though it's a "Web apps" book) to spend much more time on exploiting Web clients given the events of the past five years.

If you're wondering how the contents of HE:WA3E compare to HE:WA2E, it appears that concepts from the old ch 7 "Attacking Web Datastores" now appears in ch 6 ("Input Injection Attacks"), and ch 11 "Denial of Service (DoS) Attacks" is gone. I could tell when some material was repeated, but in other areas I could see updates (mention of the SHODAN search engine -- though not the "full details" listed on the back cover! -- for example).

Content-wise, the authors appeared to know a lot about their subject. Since I know all three from their conference appearances, I was confident in their expertise. One small note: I was disappointed by the screen shots in ch 10. The authors should keep in mind that screen captures from high resolution monitors do not translate well in print, especially when the images are fuzzy or very small.

Overall, I like HE:WA3E, but I hope to see a fourth edition return to the winning HE formula. I'd also like to see the authors take a look at some of the competing Web security books to see where they could differentiate to add even more value.
really helpful 10 décembre 2013
Par W. Vogt - Publié sur Amazon.com
Format: Broché Achat vérifié
I learned more from this in an hour of sitting and flipping than I have from hours upon hours of searching the web for answers on similar topics. Extremely helpful book for those concerned with web security... covers topics that I've never heard others mention. Also, a lot of people online... specifically with say, PHP programming, will tell you some basic rule or procedure for verifying user input, but they don't explain fully the how and the why---it's like that all over the place---but this book does a very good job of explaining why the procedures and such in PHP or other languages are necessary, and in my case helped me to understand exactly why certain procedures should be employed. (Such as making sure user-submitted data is in the expected encoding, i.e. UTF8, etc.)
Par drake - Publié sur Amazon.com
Format: Broché Achat vérifié
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
0 internautes sur 1 ont trouvé ce commentaire utile 
Web Security: Something most authors avoid in books written about building Web sites 10 décembre 2013
Par J. M. Nye - Publié sur Amazon.com
Format: Broché Achat vérifié
This book has some good advice on security issues that continue to develop and impact on innocent people's lives in unexpected ways. At the very least it puts you on alert to the risks and dangers present on the Web today, and gives some useful pointers on what to watch out for and how to ward off some of the assaults on rights and freedoms. It would appear that the Web has become a bit of a free for all where people now disregard and break the law on a daily basis with impunity. In the last few years the Web has made a joke of copyright as theft of property has become commonplace.
0 internautes sur 2 ont trouvé ce commentaire utile 
I love it 9 mai 2013
Par Costa - Publié sur Amazon.com
Format: Broché Achat vérifié
Very nice to help me secure my own application on php. I am debted to you for this book that help me more.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?