undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes Cloud Drive Photos FIFA16 cliquez_ici Rentrée scolaire Shop Fire HD 6 Shop Kindle Paperwhite cliquez_ici Jeux Vidéo
Hacking Exposed Web Applications, Third Edition et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
HACKING EXPOSED WEB APPLI... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Comme neuf | Détails
Vendu par SuperBookDeals..
État: D'occasion: Comme neuf
Commentaire: Remboursement garanti à 100%. Etat neuf, expédition rapide sous 4 à 14 jours ouvrés. Plus d'un millions de clients servis. Service à la clientèle en Français.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

HACKING EXPOSED WEB APPLICATIONS, 3rd Edition (Anglais) Broché – 1 novembre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 51,07
EUR 34,17 EUR 18,95

Livres anglais et étrangers
Lisez en version originale. Cliquez ici

Offres spéciales et liens associés

Produits fréquemment achetés ensemble

HACKING EXPOSED WEB APPLICATIONS, 3rd Edition + The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Prix pour les deux : EUR 84,48

Acheter les articles sélectionnés ensemble

Descriptions du produit

Biographie de l'auteur

Joel Scambray, CISSP, is co-founder and CEO of Consciere, provider of strategic security advisory services. He has worked in Internet security assessment and defense for nearly 15 years at Microsoft, Foundstone, Ernst & Young, and other organizations. Joel is an internationally renowned speaker and author of multiple security books, including 12 editions in the Hacking Exposed series.

Vincent Liu, CISSP, is a managing partner at Stach & Liu. He previously led the Attack & Penetration and Reverse Engineering teams at Honeywell's Global Security group, was a consultant with the Ernst & Young Advanced Security Centers, and was an analyst at the National Security Agency. Vincent speaks at industry conferences, including Black Hat, ToorCon, and Microsoft's BlueHat.

Caleb Sima is CEO of Armorize Technologies, provider of integrated Web application security solutions. He founded SPI Dynamics, a Web security technology company, and was an early innovator at Internet Security Systems/IBM's elite X-Force team. Caleb presents at key industry conferences, such as RSA and Black Hat.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 9 commentaires
22 internautes sur 22 ont trouvé ce commentaire utile 
A good book, but lacking some of what I like about the HE series 1 avril 2011
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
This is the third Hacking Exposed: Web Applications (HE:WA) book I've reviewed, having reviewed the second edition in 2006 and the first edition in 2002. While I gave the earlier editions each five stars, I don't think HE:WA3E quite meets my expectations of a five star web application security book -- at least not one bearing the Hacking Exposed (HE) series name.

In my opinion, the winning formula for a good HE book was set by the first in the series, back in 1999: 1) explain a technology of interest; 2) show exactly how to exploit it; 3) recommend countermeasures. For me, these three steps MUST be followed, and any book with HE in the title that fails to follow this recipe is likely to fall flat. The reason I like this approach is simple; in many cases, defenders first encounter a new technology only after a researcher or intruder has broken it! In other words, the offensive side is usually far ahead of the defensive side, because offenders often specialize in a promising new area and pursue it relentlessly until they break it. Good HE books help redress this imbalance by getting the defender up to speed on a new technology, showing how to break it, and then suggesting defensive measures.

I believe that while HE:WA3E adopts some of this approach, it seems to not be consistently applied. In fact, I'm wondering if the absence of Mike Shema from the author team could be the reason for this change. Mike's handiwork still appears as a legacy of using older material, but elsewhere I found myself missing the HE formula.

For example, ch 9 seems to diverge from the HE recipe. It also seemed "light" to me compared to the prevalence of client-side exploitation. When HE:WA2E arrived in 2006, client-side attacks had been popular for about three years. I would have expected HE:WA3E (even though it's a "Web apps" book) to spend much more time on exploiting Web clients given the events of the past five years.

If you're wondering how the contents of HE:WA3E compare to HE:WA2E, it appears that concepts from the old ch 7 "Attacking Web Datastores" now appears in ch 6 ("Input Injection Attacks"), and ch 11 "Denial of Service (DoS) Attacks" is gone. I could tell when some material was repeated, but in other areas I could see updates (mention of the SHODAN search engine -- though not the "full details" listed on the back cover! -- for example).

Content-wise, the authors appeared to know a lot about their subject. Since I know all three from their conference appearances, I was confident in their expertise. One small note: I was disappointed by the screen shots in ch 10. The authors should keep in mind that screen captures from high resolution monitors do not translate well in print, especially when the images are fuzzy or very small.

Overall, I like HE:WA3E, but I hope to see a fourth edition return to the winning HE formula. I'd also like to see the authors take a look at some of the competing Web security books to see where they could differentiate to add even more value.
1 internautes sur 1 ont trouvé ce commentaire utile 
really helpful 10 décembre 2013
Par W. Vogt - Publié sur Amazon.com
Format: Broché Achat vérifié
I learned more from this in an hour of sitting and flipping than I have from hours upon hours of searching the web for answers on similar topics. Extremely helpful book for those concerned with web security... covers topics that I've never heard others mention. Also, a lot of people online... specifically with say, PHP programming, will tell you some basic rule or procedure for verifying user input, but they don't explain fully the how and the why---it's like that all over the place---but this book does a very good job of explaining why the procedures and such in PHP or other languages are necessary, and in my case helped me to understand exactly why certain procedures should be employed. (Such as making sure user-submitted data is in the expected encoding, i.e. UTF8, etc.)
1 internautes sur 1 ont trouvé ce commentaire utile 
Good reference but far from comprehensive 21 octobre 2014
Par A Guy - Publié sur Amazon.com
Format: Broché Achat vérifié
Some of the content is outdated but for the most part it did what I needed it to. I was looking for an intro into Web app vulnerabilities as I begin taking on more responsibility in that at work. I do like the layout as it is easy to understand and it walks me through the use of the various tools well. You can write volumes on each chapter that this book covers so know that this is an overview and you will be happy with the money that you spent on it.
1 internautes sur 1 ont trouvé ce commentaire utile 
Par amazonD - Publié sur Amazon.com
Format: Broché Achat vérifié
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
1 internautes sur 1 ont trouvé ce commentaire utile 
Good book but you need to have fair understanding of ... 13 décembre 2014
Par Siva Kumar K - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Good book but you need to have fair understanding of Unix scripting to understand the code of some of the automated scripts that are used in the book and it doesn't mention in the book how those scripts exactly work
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?