Chapter 7. Securing Web Based Services
Introduction
In previous chapters we have discussed how to idenfity and exploit vulnerabilities in Web applications. In this chapter, we will discuss how to secure Web servers, services, and application. The problems associated with Web-based exploitation can affect a wide array ...
Get Web Application Vulnerabilities now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.