

RYAN BARNETT is a Lead Security Researcher in Trustwave's SpiderLabs Team, an advanced security team focused on penetration testing, incident response, and application security.
Meer over Ryan BarnettThe Web Application Defender's Cookbook
Battling Hackers and Protecting Users
Samenvatting
100+ recipes to improve your defenses
Are your web applications secure? Do you know how to lock down new web applications when they are placed into production? Do you know if attackers are trying to break into your site and steal data or cause other harm? The solutions in this book provide answers to these critical questions and increase your ability to thwart malicious activity within your web applications.
Each recipe includes background data explaining how the attack works, an ingredients list, and step-by-step directions. You'll learn how to prepare for attacks, analyze web transactions for malicious activity, and respond with the best solutions. ModSecurity, a versatile, open source web application firewall module for Apache, Microsoft IIS, and Nginx web server platforms, is used to demonstrate each defensive technique.
Learn to:
- Implement full HTTP auditing for incident response
- Utilize virtual patching processes to remediate identified vulnerabilities
- Deploy web tripwires (honeytraps) to identify malicious users
- Detect when users are acting abnormally
- Analyze uploaded files and web content for malware
- Recognize when web applications leak sensitive user or technical data
- Respond to attacks with varying levels of force
Specificaties
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Introduction
Part 1: Preparing the Battle Space
1. Application Fortification
2. Vulnerability Identification and Remediation
3. Poisoned Pawns (Hacker Traps)
Part 2: Asymmetric Warfare
4. Reputation and Third-Party Correlation
5. Request Data Analysis
6. Response Data Analysis
7. Defending Authentication
8. Defending Session State
9. Preventing Application Attacks
10. Preventing Client Attacks
11. Defending File Uploads
12. Enforcing Access Rate and Application Flows 3
Part 3: Tactical Response
13. Passive Response Actions
14. Active Response Actions
15. Intrusive Response Actions
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht