September 2014
Intermediate to advanced
656 pages
11h 18m
English
In this chapter, you will learn how to
• Define web applications, explain web application architecture, and explain why web servers are compromised and web pages are defaced
• Provide an overview of web logs, describe Internet Information Services (IIS) and Apache web server logs and how to investigate them
• Discuss different types of web attacks, how to investigate web attacks, and explain the investigation process for attacks in Windows-based servers
• Articulate when web page defacement occurs and discuss various security strategies for web applications
• List several web attack detection tools, and discuss different tools for locating IP addresses