Skip to Main Content
Web Application Vulnerabilities
book

Web Application Vulnerabilities

by Steven Palmer
April 2011
Intermediate to advanced content levelIntermediate to advanced
480 pages
11h 4m
English
Syngress
Content preview from Web Application Vulnerabilities

Chapter 2. Information Gathering Techniques

Introduction

There are various reasons for hacking. When most of us hear hacker we think about computer and network security, but lawyers, salesmen, and policemen are also hackers at heart. It’s really a state of mind and a way of thinking rather than a physical attribute. Why do people hack? There are a couple of motivators, but one specific reason is to be able to know things that the ordinary man on the street doesn’t. From this flow many of the other motivators. Knowledge is power—there’s ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing Web Applications

Securing Web Applications

Stephen Gates, Allan Liska
Web Application Defender's Cookbook

Web Application Defender's Cookbook

Ryan C. Barnett, Jeremiah Grossman
Web Caching

Web Caching

Duane Wessels
XSS Attacks

XSS Attacks

Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov

Publisher Resources

ISBN: 9781597492096