Download address: Download the network disk
Introduction to the editor of the hacker Attack and Defense Technology (2nd edition of the Web) from the introduction of the current Web application Security overview, focusing on the use of penetration testing in the detailed steps and techniques, and finally summarize the topics covered in the book. Each chapter is accompanied by exercises to facilitate the reader to consolidate the content of the study. "Hacker attack and Defense technology Treasure (Web Combat Article 2nd edition)" is suitable for all levels of computer security and web development and management of technical personnel reading. The book is written by Stutard and Pinto. Directory editing Chapter 1th Web Application Security and Risk 1.1 Web application development [1] 1.1.1 Common features of Web applications 1.1.2 Advantages of Web applications 1.2 Web Application Security 1.2.1 "This site is safe" 1.2.2 Core Security issues: Users can submit any input 1.2.3 key problem factors 1.2.4 new security boundaries 1.2.5 the future of Web application Security 1.3 Summary [1]
Download address: Download the network disk