Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Hacking Techniques and Tools • Chapter 5 177
Still worse are the intruders who have intentionally breached a
system in the pursuit of acquiring access to proprietary or sensitive data.
In some cases, the intruder may simply take a copy of the data—credit
card databases, source code, trade secrets, or otherwise—for his own use.
In other cases, the intruder may alter the data to suit his own ends. If the
data in question is source code, the intruder could conceivably introduce
malicious code into the product, which would in turn render vulnerable
to specific attack any system that used the software.This type of intruder
has been widely reputed by companies ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312