Skip to content
Scan a barcode
Scan
Added to your cart
Paperback The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws Book

ISBN: 0470170778

ISBN13: 9780470170779

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$15.79
Save $34.21!
List Price $50.00
Almost Gone, Only 1 Left!

You Might Also Enjoy

The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
John Heasman, Bill Grindlay, Chris Anley, David Litchfield

from: $34.87

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
Chris McNab

from: $6.89

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
John Heasman, Gerardo Richarte, Jack Koziol, Felix Lindner, Chris Anley

from: $8.39

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, Nick Sullivan, William L Simon, William L. Simon

from: $5.29

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker

from: $5.29

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh

from: $4.79

Gray Hat Hacking: The Ethical Hacker's Handbook
Gray Hat Hacking: The Ethical Hacker's Handbook
Daniel Regalado, Michael Baucom, Shon Harris, Chris Eagle, Jonathan Ness, Allen Harper

from: $6.49

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
John R. Vacca

from: $5.69

Learning Python
Learning Python
Mark Lutz

from: $8.79

The C++ Programming Language
The C++ Programming Language
Bjarne Stroustrup

from: $5.19

Complete Hackers Handbook PB
Complete Hackers Handbook PB
Dr. K., Paul Day, Brian Oblivion

from: $6.69

Operating System Concepts
Operating System Concepts
Abraham Silberschatz, Greg Gagne, Peter B Galvin, Gerg Gagne, Peter B. Galvin, Peter Baer Galvin

from: $4.05

Network Security Essentials: Applications and Standards (3rd Edition)
Network Security Essentials: Applications and Standards (3rd Edition)
William Stallings

from: $5.09

JavaScript: The Definitive Guide
JavaScript: The Definitive Guide
David Flanagan

from: $5.59

Introduction to Algorithms
Introduction to Algorithms
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein

from: $9.99

Code Complete
Code Complete
Steve McConnell

from: $5.99

The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim

from: $6.79

Web Database Applications with PHP & MySQL, 2nd Edition
Web Database Applications with PHP & MySQL, 2nd Edition
Hugh E. Williams, David Lane

from: $5.09

Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series)
Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series)
Greg Hoglund, Jamie Butler

from: $7.99

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll

from: $5.29

Book Overview

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured