Web security : (Record no. 868)

MARC details
000 -LEADER
fixed length control field 04893cam a2200493 i 4500
001 - CONTROL NUMBER
control field 18182959
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220213090601.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140610s2015 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014022587
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466592612
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138436848
Qualifying information hardback
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency EG-CaTKH
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .W822 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 WU.W 2015
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wu, Hanqing,
Relator term author.
245 10 - TITLE STATEMENT
Title Web security :
Remainder of title a WhiteHat perspective /
Statement of responsibility, etc. Hanqing Wu and Liz Zhao.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer CRC Press is an imprint of Taylor & Francis,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Beijing, China :
Name of producer, publisher, distributor, manufacturer Publishing House of Electronics Industry,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 508 pages :
Other physical details illustrations ;
Dimensions 26 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note "First issued in hardback 2017"--title page verso.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Section 1. Our view of the security world -- View of the IT security world -- Section 2. Safetyon the client script -- Security of browser -- Cross-site scripting attack -- Cross-site request forgery -- Clickjacking -- Section 3. Application on the server side -- HTML5 securities -- Injection attacks -- File upload vulnerability -- Authentication and session management -- Access control -- Encryption algorithm and random numbers -- Web framework security -- Application-layer denial-of-service attacks -- PHP security -- Web server configuration security -- Section 4. Safety operations of internet companies. -- Security of Internet business -- Security development lifecycle -- Security operations
520 ## - SUMMARY, ETC.
Summary, etc. "This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. "--
Assigning source Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. "Preface In mid-2010, Zhang Chunyu asked me if I could write a book on cloud computing. While the concept of cloud computing is very popular, there is not enough written material on how to handle this. Though I have kept myself up to date with this technology, I declined Zhang's request as the prospects in the field were not clear and instead wrote this book on web security. My Road of Security My interest in security developed when I was a student, after I got a book on hacking with no ISBN from the black market. The book had a teaching course on coolfire, which intrigued me. Ever since, I have been hooked to hacking and have taken much interest in practicing the techniques covered in these types of books. In 2000, I joined Xi'an Jiaotong University. Fortunately for me, the computer room at the university was open even after school hours. Though the price of online browsing was high, I invested most of my living expenses in the computer room. In return, I was gaining more knowledge in this field. With the momentum gained at university, I soon got my first computer with the help of my parents. This only helped to increase my interest in the field. In a short while, I collaborated with my friends to set up a technical organization called ph4nt0m.org, named after my favorite comic character. Though the organization did not last long, it helped groom top talents through communication forums that it initiated. This was the proudest achievement in the 20 years of my life. Due to the openness of the Internet and the advances in technology, I have witnessed nearly all the developments in Internet security in the last decade. During the first five years, I witnessed the technology in penetrating tests, cache overflow, and web hacking; for the next five years"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Form subdivision Popular works.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element World Wide Web
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhao, Liz,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name huda.mahmoud
Cataloging process M
First Date, FD (RLIN) 2022029
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20220213
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Cover image
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Total Renewals Date last checked out
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/23/2021 785.50   005.8 WU.W 2015 210036 08/23/2021 785.50 08/23/2021 Books    
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 02/13/2022 785.50 2 005.8 WU.W 2015 190323 04/19/2022 785.50 02/13/2022 Books 1 03/27/2022