Hacking Exposed J2EE & Java

Hacking Exposed J2EE & Java
Author: Brian Buege
Publisher: Hacking Exposed
Total Pages: 464
Release: 2002
Genre: Business & Economics
ISBN:

J2EE is the programming language backbone of Web services from Sun Microsystems and other major software developers. This work provides instruction on how to hack proof your applications, common Java attacks, countermeasures and specific case studies. Since open-source solutions continue to gain ground in the application server market, the open-source Jboss application server and the Tomcat Web server is covered in detail in addition to the independent software vendor market leader, BEA WebLogic.

Hacking Exposed Computer Forensics

Hacking Exposed Computer Forensics
Author: Chris Davis
Publisher: McGraw Hill Professional
Total Pages: 484
Release: 2005
Genre: Computers
ISBN: 9780072256758

Whether retracing the steps of a security breach or tracking down high-tech crime, this complete package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court. The bonus CD-ROM contains the latest version of each of the forensic tools covered in the book and evidence files for real-time investigation.

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing
Author: Patrick Engebretson
Publisher: Elsevier
Total Pages: 223
Release: 2013-06-24
Genre: Computers
ISBN: 0124116418

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test

Beginning Java EE 5

Beginning Java EE 5
Author: Kevin Mukhar
Publisher: Apress
Total Pages: 657
Release: 2006-11-02
Genre: Computers
ISBN: 1430200847

*J2EE 5 is a hot, emerging topic; timely to market *Book covers all other neww J2EE-related technologies, like EJB 3, JSP 2.1, etc. *Previous edition on 1.4 was excellent seller, with consistent low Amazon rank

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook
Author: Dafydd Stuttard
Publisher: John Wiley & Sons
Total Pages: 770
Release: 2011-03-16
Genre: Computers
ISBN: 1118079612

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

J2EE

J2EE
Author: James Edward Keogh
Publisher: McGraw-Hill/Osborne Media
Total Pages: 938
Release: 2002
Genre: Computers
ISBN:

This is the only J2EE book structured as a true reference with a standardized format that addresses each API. Technical review team includes faculty from Columbia University to ensure the most accurate book on the market. Provides techniques for application development on UNIX, NT, and Mac.

Mastering Enterprise JavaBeans

Mastering Enterprise JavaBeans
Author: Ed Roman
Publisher: John Wiley & Sons
Total Pages: 842
Release: 2004-12-22
Genre: Computers
ISBN: 0764584928

Includes more than 30 percent revised material and five new chapters, covering the new 2.1 features such as EJB Timer Service and JMS as well as the latest open source Java solutions The book was developed as part of TheServerSide.com online EJB community, ensuring a built-in audience Demonstrates how to build an EJB system, program with EJB, adopt best practices, and harness advanced EJB concepts and techniques, including transactions, persistence, clustering, integration, and performance optimization Offers practical guidance on when not to use EJB and how to use simpler, less costly open source technologies in place of or in conjunction with EJB

Intrusion Detection & Prevention

Intrusion Detection & Prevention
Author: Carl Endorf
Publisher: McGraw-Hill/Osborne Media
Total Pages: 432
Release: 2004
Genre: Computers
ISBN:

This volume covers the most popular intrusion detection tools including Internet Security Systems' Black ICE and RealSecurity, Cisco Systems' Secure IDS and Entercept, Computer Associates' eTrust and the open source tool Snort.

Hacking Exposed Web Applications, Third Edition

Hacking Exposed Web Applications, Third Edition
Author: Joel Scambray
Publisher: McGraw Hill Professional
Total Pages: 481
Release: 2010-10-22
Genre: Computers
ISBN: 0071740422

The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures

Network Security

Network Security
Author: BRAGG
Publisher: McGraw Hill Professional
Total Pages: 897
Release: 2012-08-11
Genre: Computers
ISBN: 0071811737

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.