Check Delivery
This book provides the readers the following insights into how: Websites are hacked by exploiting command injection, file inclusion, file upload and other vulnerabilities. Databases are compromised by basic and advanced SQL injection. Browser clients are targeted by Cross-Site Scripting attacks. Linux computers are breached by exploiting their vulnerabilities without recourse to social-engineering. Forensic tools can be used to detect malicious intrusions in to systems. Data in transit can be safeguarded by cryptographic and other mechanisms. And cyber security tools that can be deployed against the above described cyber-attacks. Table of Contents: 1.Website Attacks 2.Breaking into Linux Computers 3.File Inclusion Web Attacks 4.File Upload Web Attacks 5.Hacking the Database 6.Targeting the Browser 7.Forensics for Defense 8.Protecting Data in Transit 9.Cyber Preparedness
Author | Debtoru Chatterjee |
Publisher | Khanna Book Publishing Co. (P) Ltd. |
Language | English |
Binding Type | Paper Back |
Main Category | Engineering |
Sub Category | Computer Science & Engineering / IT |
ISBN13 | 9789355380012 |
SKU | BK 0185553 |
A handpicked list of products which has touched millions
Fast Shipping On All Orders
30 Day Money Back
Technical Support 24/7
All Cards Accepted
© Copyright 2022 | GetMyBook.com All Rights Reserved.