Web App Hacking

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

Finding and Exploiting Security Flaws

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications.

View Book on Amazon

Web Application Security

A Beginner's Guide

Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.

View Book on Amazon

Web Application Defender's Cookbook

Battling Hackers and Protecting Users

This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.

View Book on Amazon

Web Application Security Complete Certification Kit

Study Book and eLearning Program

This self-study Exam preparation guide and its accompanying online course for the Web Application Security Certification Exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all Web Application Security subjects, test tricks and tips, numerous highly realistic sample questions, and exercises designed to strengthen understanding of Web Application Security concepts and prepare you for Exam success on the first attempt are provided.

View Book on Amazon

Hacking Web Apps

Detecting and Preventing Web Application Security Problems

The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

View Book on Amazon