返回首页
苏宁会员
购物车 0
易付宝
手机苏宁

服务体验

店铺评分与同行业相比

用户评价:----

物流时效:----

售后服务:----

  • 服务承诺: 正品保障
  • 公司名称:
  • 所 在 地:
本店所有商品

  • 醉染图书KALI LINUX WEB渗透测试(第3版)9787564183
  • 正版全新
    • 作者: GilbertoNajera-Gutierrez,JunedAhmedAnsari著 | GilbertoNajera-Gutierrez,JunedAhmedAnsari编 | GilbertoNajera-Gutierrez,JunedAhmedAnsari译 | GilbertoNajera-Gutierrez,JunedAhmedAnsari绘
    • 出版社: 东南大学出版社
    • 出版时间:2019-04-01
    送至
  • 由""直接销售和发货,并提供售后服务
  • 加入购物车 购买电子书
    服务

    看了又看

    商品预定流程:

    查看大图
    /
    ×

    苏宁商家

    商家:
    醉染图书旗舰店
    联系:
    • 商品

    • 服务

    • 物流

    搜索店内商品

    商品分类

    商品参数
    • 作者: GilbertoNajera-Gutierrez,JunedAhmedAnsari著| GilbertoNajera-Gutierrez,JunedAhmedAnsari编| GilbertoNajera-Gutierrez,JunedAhmedAnsari译| GilbertoNajera-Gutierrez,JunedAhmedAnsari绘
    • 出版社:东南大学出版社
    • 出版时间:2019-04-01
    • 版次:1
    • 印次:1
    • 字数:524千字
    • 页数:408
    • ISBN:9787564183233
    • 版权提供:东南大学出版社
    • 作者:GilbertoNajera-Gutierrez,JunedAhmedAnsari
    • 著:GilbertoNajera-Gutierrez,JunedAhmedAnsari
    • 装帧:平装
    • 印次:1
    • 定价:106.00
    • ISBN:9787564183233
    • 出版社:东南大学出版社
    • 开本:暂无
    • 印刷时间:暂无
    • 语种:暂无
    • 出版时间:2019-04-01
    • 页数:408
    • 外部编号:1201882981
    • 版次:1
    • 成品尺寸:暂无

    Preface
    Chapter 1: Introduction to Penetration Testing and Web Applications
    Proactive security testing
    Different testing methodologies
    Ethical hacking
    Penetration testing
    Vulnerability assessment
    Security audits
    Considerations when performing penetration testing
    Rules of Engagement
    The type and scope of testing
    Client contact details
    Client IT team notifications
    Sensitive data handling
    Status meeting and reports
    The limitations of penetration testing
    The need for testing web applications
    Reasons to guard against attacks on web applications
    Kali Linux
    A web application overview for penetration testers
    HTTP protocol
    Knowing an HTTP request and response
    The request header
    The response header
    HTTP methods
    The GET method
    The POST method
    The HEAD method
    The TRACE method
    The PUT and DELETE methods
    The OPTIONS method
    Keeping sessions in HTTP
    Cookies
    Cookie flow between server and client
    Persistenndnnpersistent cookies
    Cookie parameters
    HTML data in HTTP response
    The server-side code
    Multilayer web application
    Three-layer web application design
    Web services
    Introducing SOAP and REST web services
    HTTP methods in web services
    XML and JSON
    AJAX
    Building blocks of AJAX
    The AJAX workflow
    HTML5
    WebSockets
    Summary
    Chapter 2: Setting Up Your Lab with Kali Linux
    Kali Linux
    Latest improvements in Kali Linux
    Installing Kali Linux
    Virtualizing Kali Linux versus installing it on physical hardware
    Installing on VirtualBox
    Creating the virtual machine
    Installing the system
    Important tools in Kali Linux
    CMS & Framework Identification
    WPScan
    JoomScan
    CMSmap
    Web Application Proxies
    Burp Proxy
    Customizing client interception
    Modifying requests on the fly
    Burp Proxy with HTTPS websites
    Zed Attack Proxy
    ProxyStrike
    Web Crawlers and Directory Bruteforce
    Chapter 3: Reconnaissance and Profiling the Web Sewer
    Reconnaissance
    Chapter 4: Authentication and Session Management Flaws
    Authentication schemes in web applications
    Chapter 5: Detecting and Exploiting Injection-Based Flaws
    Command injection
    Chapter 6: Finding and Exploiting Cross-Site Scripting (XSS)
    Vulnerabilities
    Chapter 7: Cross-Site Request Forgery, Identification, and
    Exploitation
    Chapter 8: Attacking Flaws in Cryptographic Implementations
    Chapter 9: AJAX, HTML5, and Client-Side Attacks
    Crawling AJAX applications
    Chapter 10: Other Common Security Flaws in Web Applications
    Insecure direct object references
    Chapter 11 : Using Automated Scanners on Web Applications
    Considerations before using an automated scanner
    Web application vulnerability scanners in Kali Linux
    Index

    吉尔博托?N.古铁雷斯,Gilberto Najera-Gutierrez is an experienced penetration tester currently working for one ofthe top security testing service providers in Australia. He obtained leading security andpenetration testing certifications, namely Offensive Security Certified Professional (OSCP),EC-Council Certified Security Administrator (ECSA), and GIAC Exploit Researcher andAdvanced Penetration Tester (GXPN); he also holds a Master's degree in Computer Sciencewith speization in Artifi Intelligence.
    Gilberto has been working as a penetration tester since 2013, and he has been a securityenthusiast for almost 20 years. He has successfully conducted penetration tests on networksan ppictons of some the biggest corporations, government agencies, and finaninstitutions in Mexico and Australia.

    售后保障

    最近浏览

    猜你喜欢

    该商品在当前城市正在进行 促销

    注:参加抢购将不再享受其他优惠活动

    x
    您已成功将商品加入收藏夹

    查看我的收藏夹

    确定

    非常抱歉,您前期未参加预订活动,
    无法支付尾款哦!

    关闭

    抱歉,您暂无任性付资格

    此时为正式期SUPER会员专享抢购期,普通会员暂不可抢购