دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Ravi Das
سری:
ISBN (شابک) : 0367333759, 9780367333751
ناشر: CRC Press
سال نشر: 2020
تعداد صفحات: 224
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 8 مگابایت
در صورت تبدیل فایل کتاب Testing and Securing Web Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تست و ایمن سازی برنامه های کاربردی وب نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
برنامه های کاربردی وب فضای بزرگی را در زیرساخت فناوری اطلاعات یک کسب و کار یا شرکت اشغال می کنند. آنها به سادگی یک قسمت جلویی یا انتهایی را لمس نمی کنند. برنامه های وب امروزی تقریباً در هر گوشه از آن تأثیر می گذارد. برنامههای وب امروزی پیچیده شدهاند، که آنها را به هدف اصلی برای حملات سایبری پیچیده تبدیل کرده است. در نتیجه، برنامههای وب باید به معنای واقعی کلمه از داخل و خارج از نظر امنیت آزمایش شوند، قبل از اینکه بتوانند برای انجام تراکنشهای تجاری برای عموم راهاندازی و اجرا شوند.
هدف اصلی این کتاب پرداختن به مناطق خاصی است که قبل از اینکه یک برنامه وب کاملاً ایمن در نظر گرفته شود نیاز به آزمایش دارد. این کتاب به طور خاص پنج حوزه کلیدی را بررسی میکند:
آزمایش و ایمن سازی برنامه های کاربردی وب پیچیدگی تست امنیت برنامه های کاربردی وب را از بین می برد. بنابراین این بخش حیاتی زیرساخت فناوری اطلاعات و شرکت ایمن و در حال اجرا باقی می ماند.
Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur.
The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas:
Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.
Cover Half Title Title Page Copyright Page Dedication Contents Acknowledgments About the Authors 1. Network Security Introduction A Chronological History of the Internet The Evolution of Web Applications The Fundamentals of Network Security – The OSI Model The OSI Model What Is the Significance of the OSI Model to Network Security? The Classification of Threats to the OSI Model The Most Probable Attacks Assessing a Threat to a Web Application Network Security Terminology The Types of Network Security Topologies Best Suited for Web Applications The Types of Attack That Can Take Place against Web Applications How to Protect Web Applications from DDoS Attacks Defending against Buffer Overflow Attacks Defending against IP Spoofing Attacks Defending against Session Hijacking Defending Virus and Trojan Horse Attacks Viruses How a Virus Spreads Itself The Different Types of Viruses Defending Web Applications at a Deeper Level The Firewall Types of Firewalls Blacklisting and Whitelisting How to Properly Implement a Firewall to Safeguard the Web Application The Use of Intrusion Detection Systems Understanding What a Network Intrusion Detection System Is Preemptive Blocking Anomaly Detection Important NIDS Processes and Subcomponents The Use of VPNs to Protect a Web Application Server The Basics of VPN Technology The Virtual Private Network Protocols that are Used to Secure a Web Application Server How PPTP Sessions are Authenticated How Layer 2 Tunneling Protocol (L2TP) Sessions are Authenticated How Password Authentication Protocol (PAP) Sessions are Authenticated How Shiva Password Authentication Protocol (SPAP)Sessions are Authenticated How Kerberos Protocol Sessions are Authenticated How IPSec Protocol Sessions are Authenticated How SSL Protocol Sessions are Authenticated How to Assess the Current State of Security of a Web Application Server Important Risk Assessment Methodologies and How They Relate to Web Application Security Single Loss Expectancy (SLE) The Annualized Loss Expectancy (ALE) The Residual Risk How to Evaluate the Security Risk that is Posed to the Web Application and its Server How to Conduct the Initial Security Assessment on the Web Application Techniques Used by Cyberattackers against the Web Application and Web Application Server The Techniques Used by the Cyberhacker Techniques Used by the Cyberattacker Network Security and Its Relevance for Web Apps Data Confidentiality Common Technical Layouts for Modern Web App Infrastructure Encrypting Data in Flight TLS Certificate Setting Up the Session Finishing the Handshake Site Validity Proving Your Web App Is What It Says It Is Testing Your Web App’s Confidentiality and Trust What Kind of Trust? Spoofing and Related Concerns Conclusion Resources References 2. Cryptography An Introduction to Cryptography Message Scrambling and Descrambling Encryption and Decryption Ciphertexts Symmetric Key Systems and Asymmetric Key Systems The Caesar Methodology Types of Cryptographic Attacks Polyalphabetic Encryption Block Ciphers Initialization Vectors Cipher Block Chaining Disadvantages of Symmetric Key Cryptography The Key Distribution Center Mathematical Algorithms with Symmetric Cryptography The Hashing Function Asymmetric Key Cryptography Public Keys and Public Private Keys The Differences Between Asymmetric and Symmetric Cryptography The Disadvantages of Asymmetric Cryptography The Mathematical Algorithms of Asymmetric Cryptography The Public Key Infrastructure The Digital Certificates How the Public Key Infrastructure Works Public Key Infrastructure Policies and Rules The LDAP Protocol The Public Cryptography Standards Parameters of Public Keys and Private Keys How Many Servers? Security Policies Securing the Public Keys and the Private Keys Message Digests and Hashes Security Vulnerabilities of Hashes A Technical Review of Cryptography The Digital Encryption Standard The Internal Structure of the DES The Initial and Final Permutations The f-Function The Key Schedule The Decryption Process of the DES Algorithm The Reversed Key Schedule The Decryption in the Feistel Network The Security of the DES The Advanced Encryption Standard The Mathematics behind the DES Algorithm The Internal Structure of the AES Algorithm Decryption of the AES Algorithm Asymmetric and Public Key Cryptography The Mathematics behind Asymmetric Cryptography The RSA Algorithm The Use of Fast Exponentiation in the RSA Algorithm The Use of Fast Encryption with Shorter Public Key Exponentiation The Chinese Remainder Theorem (CRT) How to Find Large Prime Integers for the RSA Algorithm The Use of Padding in the RSA Algorithm Specific Cyberattacks on the RSA Algorithm The Digital Signature Algorithm Digital Signature Computation and Verification Process for the DSA The Prime Number Generation Process in the DSA Security Issues with the DSA The Elliptic Curve Digital Signature Algorithm The Generation of the Public Key and the Private Key Using the ECDSA Algorithm The Signature and the Verification Process of the ECDSA Algorithm The Use of Hash Functions The Security Requirements of Hash Functions A Technical Overview of Hash Function Algorithms Block Cipher–Based Hash Functions Technical Details of the Secure Hash Algorithm SHA-1 Key Distribution Centers The Public Key Infrastructure and Certificate Authority Resources 3. Penetration Testing Introduction Peeling the Onion True Stories External Testing: Auxiliary System Vulnerabilities Internal Testing Report Narrative Report Narrative Web Application Testing SSID Testing Types of Penetration Tests Definitions of Low, Medium, High, and Critical Findings in Penetration Testing Compliances and Frameworks: Pen Testing Required OWASP and OWASP Top Ten OWASP Top Ten with Commentary Tools of the Trade Pen Test Methodology Penetration Test Checklist for External IPs and Web Applications Chapter Takeaways Resources 4. Threat Hunting Not-So-Tall Tales Nation-State Bad Actors: China and Iran Threat Hunting Methods MITRE ATT&CK Technology Tools The SIEM EDR EDR + SIEM IDS When 1 + 1 + 1 = 1: The Visibility Window Threat Hunting Process or Model On Becoming a Threat Hunter Threat Hunting Conclusions Resources 5. Conclusions Index