logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Web Security A Whitehat Perspective Hanqing Wu Liz Zhao

  • SKU: BELL-5035220
Web Security A Whitehat Perspective Hanqing Wu Liz Zhao
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Web Security A Whitehat Perspective Hanqing Wu Liz Zhao instant download after payment.

Publisher: Auerbach Publications
File Extension: PDF
File size: 22.78 MB
Pages: 544
Author: Hanqing Wu, Liz Zhao
ISBN: 9781466592612, 1466592613
Language: English
Year: 2015

Product desciption

Web Security A Whitehat Perspective Hanqing Wu Liz Zhao by Hanqing Wu, Liz Zhao 9781466592612, 1466592613 instant download after payment.

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system.

In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Related Products