Buy Attack and Defend Computer Security Set - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Attack and Defend Computer Security Set
Attack and Defend Computer Security Set

Attack and Defend Computer Security Set


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s Handbook and Malware Analyst’s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves. The Web Application Hacker's Handbook takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends and threats, this guide covers remoting frameworks, HTML5, and cross-domain integration techniques along with clickjacking, framebusting, HTTP parameter pollution, XML external entity injection, hybrid file attacks, and more. The Malware Analyst's Cookbook includes a book and DVD and is designed to enhance the analytical capabilities of anyone who works with malware. Whether you’re tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you go beyond the basic tools for tackling security challenges to cover how to extend your favorite tools or build your own from scratch using C, Python, and Perl source code. The companion DVD features all the files needed to work through the recipes in the book and to complete reverse-engineering challenges along the way. The Attack and Defend Computer Security Set gives your organization the security tools needed to sound the alarm and stand your ground against malicious threats lurking online.

Table of Contents:
WEB APPLICATION HACKER’S HANDBOOK 2E Chapter 1: Web Application (In)security 1 Chapter 2: Core Defense Mechanisms 17 Chapter 3: Web Application Technologies 39 Chapter 4: Mapping the Application 73 Chapter 5: Bypassing Client-Side Controls 117 Chapter 6: Attacking Authentication 159 Chapter 7: Attacking Session Management 205 Chapter 8: Attacking Access Controls 257 Chapter 9: Attacking Data Stores 287 Chapter 10: Attacking Back-End Components 357 Chapter 11: Attacking Application Logic 405 Chapter 12: Attacking Users: Cross-Site Scripting 431 Chapter 13: Attacking Users: Other Techniques 501 Chapter 14: Automating Customized Attacks 571 Chapter 15: Exploiting Information Disclosure 615 Chapter 16: Attacking Native Compiled Applications 633 Chapter 17: Attacking Application Architecture 647 Chapter 18: Attacking the Application Server 669 Chapter 19: Finding Vulnerabilities in Source Code 701 Chapter 20: A Web Application Hacker’s Toolkit 747 Chapter 21: A Web Application Hacker’s Methodology 791 MALWARE ANALYST’S COOKBOOK AND DVD Chapter 1: Anonymizing Your Activities 1 Chapter 2: Honeypots 27 Chapter 3: Malware Classifi cation 51 Chapter 4: Sandboxes and Multi-AV Scanners 89 Chapter 5: Researching Domains and IP Addresses 119 Chapter 6: Documents, Shellcode, and URLs 155 Chapter 7: Malware Labs 211 Chapter 8: Automation 239 Chapter 9: Dynamic Analysis 283 Chapter 10: Malware Forensics 337 Chapter 11: Debugging Malware 395 Chapter 12: De-Obfuscation 441 Chapter 13: Working with DLLs 487 Chapter 14: Kernel Debugging 511 Chapter 15: Memory Forensics with Volatility 571 Chapter 16: Memory Forensics: Code Injection and Extraction 601 Chapter 17: Memory Forensics: Rootkits 637 Chapter 18: Memory Forensics: Network and Registry 673

About the Author :
Dafydd Stuttard has more than 10 years' experience in the area of web application security. He is the lead author of Web Application Hacker's Handbook 1e and 2e, has performed penetration testing training around the world. Marcus Pinto is co-author of Web Application Hacker's Handbook 1e and 2e and has over 10 years' experience within web application security. He has delivered a variety of training courses to technical audiences and speaks at security events around and outside of the UK. Michael Hale Ligh is the lead author of The Malware Analyst's Cookbook and Director of Malware Research of the The Volatility Project. Michael is a regular presenter at DefCon conferences. Matt Richard is and is the Malicious Code Operations Lead at Raytheon Corporation and has written a number of testing tools. Steven Adair is a security researcher with The Shadowserver Foundation and co-author of The Malware Analyst's Cookbook and deals with cyber attacks of all kinds esp. those linked to cyber espionage. Blake Hartstein conducts incident response and intrusion detection for Bloomberg and previously for VeriSign. The biggest and best companies worldwide depend on him for intelligence about attacks affecting their organization.


Best Sellers


Product Details
  • ISBN-13: 9781118906736
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 234 mm
  • No of Pages: 1656
  • Returnable: N
  • Weight: 2495 gr
  • ISBN-10: 111890673X
  • Publisher Date: 13 May 2014
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 86 mm
  • Width: 188 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Attack and Defend Computer Security Set
John Wiley & Sons Inc -
Attack and Defend Computer Security Set
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Attack and Defend Computer Security Set

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!