Web Application Hacking

  • Rahalkar S
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security world has spent the last decade focusing on protecting networks from traditional security attack vectors. Network Firewalls and related filtering solutions today have reached levels sophisticated enough to allow drag and drop enforcement of security policies. The goal posts however have shifted once more with the wide spread deployment of custom and COTS web based applications. These web applications can not be protected by the solutions that security professionals have become accustomed to, and in many cases need to be re-written from the ground up with security in mind. This talk will highlight some of the attack vectors in this new security playground and discuss potential solutions and work arounds.

Cite

CITATION STYLE

APA

Rahalkar, S. A. (2016). Web Application Hacking. In Certified Ethical Hacker (CEH) Foundation Guide (pp. 131–141). Apress. https://doi.org/10.1007/978-1-4842-2325-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free