rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781597495431

Seven Deadliest Web Application Attacks

by
  • ISBN13:

    9781597495431

  • ISBN10:

    1597495433

  • Format: Paperback
  • Copyright: 2010-03-17
  • Publisher: Syngress Media Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $26.95 Save up to $7.75
  • Rent Book $19.20
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE

    7-Day eTextbook Access 7-Day eTextbook Access

    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Seven Deadliest Web Application Attacks [ISBN: 9781597495431] for the semester, quarter, and short term or search our site for other textbooks by Shema, Mike. Renting a textbook can save you up to 90% from the cost of buying.

Summary

"If you use the Web in any way then this should be on your bookshelf. In addition to the detailing the threat, Shema also provides countermeasures to minimize or remove the risk, but be warned; you may never look at a Web site the same way again."--Andrew Waite, InfoSanity Research.

Table of Contents

Introduction
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
SQL Injection
Server Misconfiguration and Predictable Pages
Breaking Authentication Schemes
Logic Attacks
Web of Distrust
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program