logo
Home Science & Tech Computer and I.T. PHP Security & Cracking Puzzles
product-img
PHP Security & Cracking Puzzles
Enjoying reading this book?

PHP Security & Cracking Puzzles

by Maxim Kuznetsov
4.4
4.4 out of 5
Creators
Author Maxim Kuznetsov
Publisher BPB Publications
Synopsis Concentrating on the process of breaking and protecting Web applications written in PHP, this book also considers related Web programming topics such as client technologies (HTML, cookies, JavaScript), application protocols (HTTP, SMTP), SQL query language, and the breaking and protecting of the Apache Web server. Because these techniques can only be achieved by practical work, the book is divided into two parts: one covering the problem (puzzles) and one devoted to solving the problem. Evaluating the main problem for many Web programmers protecting their applications from being hacked—that they think differently than hackers—this book allows the reader to think like a hacker and understand the techniques they use.   About the Author Maxim Kuznetsov is the director of information technologies and deputy director of longrange planning for Informsvyazstroy and the manager of the SoftTime Information Technologies Studio. He is the coauthor of several scientific works in the areas of radio spectroscopy, photo chemistry and photo physics, mathematical modeling, scientific and technical software development, and molecular quantum mechanics. Igor Simdyanov is the lead programmer of the software development department at Informsvyazstroy. He is the coauthor of 42 scientific works covering mathematical modeling of photo physical processes, scientific and technical software development, and molecular quantum mechanics. CDROM:   The accompanying CDROM contains distributions of PHP, Apache, and MySQL for Windows and Linux and the source codes for all of the solutions discussed.   Preface PART 1: PUZZLES Chapter 1.1 : Strings Chapter 1.2 : Regular Expressions Chapter 1.3: Working with Files Chapter 1.4 : MySQL and SQL Injections Chapter 1.5 : Session and Cookies Chapter 1.6 : User Agents and Referrers Chapter 1.7 : Authorization and Authentication Chapter 1.8 : Using Information from Other Sites Chapter 1.9 : File Transfer Protocol Chapter 1.10: Hypertext Transfer Protocol Chapter 1.11: Electronic Mail Chapter 1.12: The Whois Services Chapter 1.13: UNIX Chapter 1.14:Telltale Scripts Chapter 1.15: Miscellaneous   PART 2: SOLUTIONS Chapter 2.1: Strings Chapter 2.2: Regular Expressions Chapter 2.3: Working with Files Chapter 2.4: My SQL and SQL Injections Chapter 2.5: Sessions and Cookies Chapter 2.6: User Agents and Referrers Chapter 2.7: Authorization and Authentication Chapter 2.8: Using Information from Other Sites Chapter 2.9: File Transfer Protocol Chapter 2.10: Hypertext Transfer Protocol Chapter 2.11: Electronic Mail Chapter 2.12: the Whois Service Chapter 2.13: UNIX Chapter 11.14: Telltale Scripts Chapter 2.15: Miscellaneous Index

Enjoying reading this book?
Binding: PaperBack
About the author
Specifications
  • Language: English
  • Publisher: BPB Publications
  • Pages: 388
  • Binding: PaperBack
  • ISBN: 9788183331982
  • Category: Computer and I.T.
  • Related Category: Advance Science
Share this book Twitter Facebook


Suggested Reads
Suggested Reads
Books from this publisher
Introducing PHP7/MySQL by Sham Tickoo
Excel 2007 by Rutkosky.Seguin.Rutkosky
Learning Java by David Herst
PC Hardware & Components and PC Architecture (H1 & H2) by Satish Jain
'O' Level Made Simple Application of .NET Technology (M4.I-R4) by Satish Jain
PC Troubleshooting & Repair Guide by Soper
Books from this publisher
Related Books
BPB Golden Solutions Programming and Problem Solving Through C Prof. Satish Jain
Microservices by Examples Using .NET Core Baishakhi Banerjee
SAP/ ABAP HANA Programming Sudipta Malakar
Data Warehousing BPB
Mastering Database Technologies Ivan Bayross
Project Management Interview Questions Shivprasad Koirala
Related Books
Bookshelves
Stay Connected