69,95 €
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
35 °P sammeln
69,95 €
Als Download kaufen
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
35 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
35 °P sammeln
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive g
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 37.71MB
Andere Kunden interessierten sich auch für
Joseph M. FirestoneEnterprise Information Portals and Knowledge Management (eBook, PDF)68,95 €
Designing a Total Data Solution (eBook, PDF)35,95 €
Peter TrimStrategic Cyber Security Management (eBook, PDF)49,95 €
Strategic, Policy and Social Innovation for a Post-Industrial Korea (eBook, PDF)42,95 €
Arild SaetherNatural Law and the Origin of Political Economy (eBook, PDF)43,95 €
Nils PetersThe country-of-origin affect on perception of services (eBook, PDF)36,99 €
Emma ParryImpact in Doctoral Education (eBook, PDF)21,95 €-
-
-
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive g
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 532
- Erscheinungstermin: 6. April 2015
- Englisch
- ISBN-13: 9781466592629
- Artikelnr.: 42564850
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 532
- Erscheinungstermin: 6. April 2015
- Englisch
- ISBN-13: 9781466592629
- Artikelnr.: 42564850
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Axie Wu was a founder of ph4nt0m.org, one of China's famous domestic security organizations. He is proficient in different offensive and defensive techniques with regard to web security. He joined Alibaba Co., Ltd, China, after his graduation from Xi'an Jiaotong University in 2005 and became the youngest expert level engineer in Alibaba by 2007. He then designed the network security systems for Alibaba, Taobao, and Alipay. He was completely involved in the security development process for Alibaba, where he gained extensive experience in the field of application security. From 2011 onward, he has been a security architect in Alibaba, responsible for group-wide web security and cloud computing security. Wu is currently product vice president of Anquanbao.com and is responsible for the company's product development and design. He also leads the Zhejiang chapter of OWASP China.
Lizzie Zhao graduated from the University of Bridgeport, Connecticut, in 2001. She then worked at a computer training institute in New York City. Two years later, she returned to China and took up work with the subsidiary of a software company at the institute of the Chinese Academy of Sciences (CAS) as a project manager and system architect. In 2006, she joined the information technology promotion office of CECA (China E-Commerce Association). In 2007, she cofounded the RWStation (Beijing) Network Technology Co., Ltd., with other shareholders, and has since managed the company. From September 2011, Liz has focused her attention on China's network security issues and has aimed to help enterprises in China with system security and network security business. She initiated the establishment of the Union SOSTC Alliance (Security Open Source Technology of China) with the help of other Chinese and overseas security experts. She is also a popular consultant for IT security service for various companies and for the Chinese government. Liz is currently the head of the S
Lizzie Zhao graduated from the University of Bridgeport, Connecticut, in 2001. She then worked at a computer training institute in New York City. Two years later, she returned to China and took up work with the subsidiary of a software company at the institute of the Chinese Academy of Sciences (CAS) as a project manager and system architect. In 2006, she joined the information technology promotion office of CECA (China E-Commerce Association). In 2007, she cofounded the RWStation (Beijing) Network Technology Co., Ltd., with other shareholders, and has since managed the company. From September 2011, Liz has focused her attention on China's network security issues and has aimed to help enterprises in China with system security and network security business. She initiated the establishment of the Union SOSTC Alliance (Security Open Source Technology of China) with the help of other Chinese and overseas security experts. She is also a popular consultant for IT security service for various companies and for the Chinese government. Liz is currently the head of the S
My View of the Security World. View of the IT Security World. Safety on the
Client Script. Security of Browser. Cross-Site Scripting Attack. Cross-Site
Request Forgery. Clickjacking. HTML 5 Securities. Application Security on
the Server Side. Injection Attacks. File Upload Vulnerability.
Authentication and Session Management. Access Control. Encryption
Algorithms and Random Numbers. Web Framework Security. Application-Layer
Denial-of-Service Attacks. PHP Security. Web Server Configuration Security.
Safety Operations of Internet Companies. Security of Internet Business.
Security Development Lifecycle. Security Operations.
Client Script. Security of Browser. Cross-Site Scripting Attack. Cross-Site
Request Forgery. Clickjacking. HTML 5 Securities. Application Security on
the Server Side. Injection Attacks. File Upload Vulnerability.
Authentication and Session Management. Access Control. Encryption
Algorithms and Random Numbers. Web Framework Security. Application-Layer
Denial-of-Service Attacks. PHP Security. Web Server Configuration Security.
Safety Operations of Internet Companies. Security of Internet Business.
Security Development Lifecycle. Security Operations.
My View of the Security World. View of the IT Security World. Safety on the
Client Script. Security of Browser. Cross-Site Scripting Attack. Cross-Site
Request Forgery. Clickjacking. HTML 5 Securities. Application Security on
the Server Side. Injection Attacks. File Upload Vulnerability.
Authentication and Session Management. Access Control. Encryption
Algorithms and Random Numbers. Web Framework Security. Application-Layer
Denial-of-Service Attacks. PHP Security. Web Server Configuration Security.
Safety Operations of Internet Companies. Security of Internet Business.
Security Development Lifecycle. Security Operations.
Client Script. Security of Browser. Cross-Site Scripting Attack. Cross-Site
Request Forgery. Clickjacking. HTML 5 Securities. Application Security on
the Server Side. Injection Attacks. File Upload Vulnerability.
Authentication and Session Management. Access Control. Encryption
Algorithms and Random Numbers. Web Framework Security. Application-Layer
Denial-of-Service Attacks. PHP Security. Web Server Configuration Security.
Safety Operations of Internet Companies. Security of Internet Business.
Security Development Lifecycle. Security Operations.







