Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
48 Chapter 2 • How to Avoid Becoming a “Code Grinder”
know what form data is being passed. It takes everything from the
QUERY_STRING and sucks it into the program. Using Perl, PHP, or
Java, a programmer need not really be concerned with such risks as
buffer overflows, but it is still nice to be able to eyeball the program and
see quite quickly what values of the form are being used and for what.
So does this code work? Sure—that’s the whole point. It works as a
unit, and the programmer using this code does not necessarily need to
know how it works in order to achieve the desired results.What if this
code didn’t work? If a novice programmer used this chunk ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312