The browser hacker's handbook (Record no. 25306)
[ view plain ]
LIBRARY OF CONGRESS CONTROL NUMBER | |
---|---|
LC control number | 2013958295 |
ISBN | |
International Standard Book Number | 9781118662090 |
ISBN | |
International Standard Book Number | 1118662091 (pbk.) |
DEWEY DECIMAL CLASSIFICATION NUMBER | |
Call number | 005.8 |
MAIN ENTRY--PERSONAL AUTHOR | |
Authors | Alcorn, Wade |
TITLE STATEMENT | |
Title | The browser hacker's handbook |
Statement of responsibility, etc. | Wade Alcorn, Christian Frichot, Michele OrrĂ¹ |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Indianapolis, IN : |
Publisher | Wiley, |
Date | c2014. |
PHYSICAL DESCRIPTION | |
Extent | xxi, 626 p. : |
Other Details | ill. ; |
Size | 24 cm. |
BIBLIOGRAPHY, ETC. NOTE | |
Note | Includes bibliographical references and index. |
SUMMARY | |
Summary | Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer networks |
General | Security measures |
Geographic | Handbooks, manuals, etc. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Browsers (Computer programs) |
Geographic | Handbooks, manuals, etc. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer security |
Geographic | Handbooks, manuals, etc. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Penetration testing (Computer security) |
Geographic | Handbooks, manuals, etc. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Browsers (Computer programs) |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer networks |
General | Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer security |
ADDED ENTRY | |
Personal name | Frichot, Christian |
ADDED ENTRY | |
Personal name | OrrĂ¹, Michele |
ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8">https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8</a> |
Public note | Location Map |
MAIN ENTRY--PERSONAL AUTHOR | |
-- | 38540 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 38541 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 38542 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 38543 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 38544 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 38545 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 2602 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 641 |
ADDED ENTRY | |
-- | 38546 |
ADDED ENTRY | |
-- | 38547 |
Date last seen | Total checkouts | Full call number | Barcode | Date last borrowed | Cost, replacement price | Price effective from | Koha item type | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Withdrawn status | Permanent location | Current location | Shelving location | Date acquired | Source of acquisition |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
05/06/2017 | 1 | 005.8 AL BR | T0015142 | 31/05/2017 | 220.00 | 26/01/2017 | REGULAR | Dewey Decimal Classification | University of Wollongong in Dubai | University of Wollongong in Dubai | Main Collection | 13/11/2014 | University Bookshop Sharjah |