Web Application Obfuscation: '/WAFs..Evasion..Filters//alert(/Obfuscation/)',Used
Web Application Obfuscation: '/WAFs..Evasion..Filters//alert(/Obfuscation/)',Used
Web Application Obfuscation: '/WAFs..Evasion..Filters//alert(/Obfuscation/)',Used

Web Application Obfuscation: '/WAFs..Evasion..Filters//alert(/Obfuscation/)',Used

In Stock
SKU: SONG1597496049
Brand: Syngress
Condition: Used
Regular price$13.54
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundredsif not millionsof variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: How many pages does this book have? A: This book has two hundred eighty-two pages. It provides a comprehensive exploration of web application security and obfuscation techniques.
  • Q: What is the binding type of this book? A: The binding type is paperback. This makes it lightweight and portable for easy reading.
  • Q: What are the dimensions of the book? A: The book measures seven point five two inches in length, zero point six seven inches in width, and nine point two five inches in height. These dimensions make it a convenient size for both shelf storage and carrying.
  • Q: Who is the author of this book? A: The author is Mario Heiderich. He provides insights from an attacker's perspective on web application vulnerabilities.
  • Q: What genre does this book belong to? A: This book belongs to the Computer Science genre. It focuses on web application security and obfuscation.
  • Q: Is this book suitable for beginners? A: Yes, this book is suitable for beginners. It covers foundational concepts of web application security in an accessible manner.
  • Q: What is the main focus of this book? A: The main focus is on web application obfuscation and security measures. It addresses vulnerabilities from an attacker's viewpoint.
  • Q: Can this book help improve security defenses? A: Yes, it offers strategies to strengthen security defenses. Readers will learn how attackers bypass security controls.
  • Q: Is this book recommended for professionals in cybersecurity? A: Yes, it is highly recommended for cybersecurity professionals. It provides valuable insights and techniques for improving defensive strategies.
  • Q: How should I store this book to keep it in good condition? A: Store this book in a cool, dry place. Keep it upright on a shelf or lay it flat to prevent damage to the spine.
  • Q: Can I clean the book's cover? A: Yes, you can clean the cover gently with a damp cloth. Avoid using harsh cleaners to protect the book's surface.
  • Q: What if the book arrives damaged? A: If the book arrives damaged, you should contact the seller for a return or replacement. Most sellers have policies in place for such issues.
  • Q: Is there a warranty for this book? A: No, there is typically no warranty for books. However, you can check the seller’s return policy for any guarantees.
  • Q: What should I do if I have questions about the content? A: If you have questions about the content, consider reaching out to online forums or communities focused on cybersecurity for further discussion.
  • Q: Are there any age restrictions for reading this book? A: No, there are no age restrictions for reading this book. However, it is more suitable for adults or older teens interested in cybersecurity.

Recently Viewed