Penetration Testing with Java: A step-by-step pen testing handbook for Java applications
Par :Formats :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
- Non compatible avec un achat hors France métropolitaine

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
- FormatePub
- ISBN978-93-6589-264-2
- EAN9789365892642
- Date de parution08/01/2025
- Protection num.Adobe DRM
- Infos supplémentairesepub
- ÉditeurBPB Publications
Résumé
Proxy tools like Burp Suite and OWASP Zap are shown, offering insights into their configurations and capabilities for web application testing. Each chapter does a deep dive into specific vulnerabilities and attack vectors associated with Java web and mobile applications. Key topics include SQL injection, cross-site scripting (XSS), authentication flaws, and session management issues. Each chapter supplies background information, testing examples, and practical secure coding advice to prevent these vulnerabilities.
There is a distinct focus on hands-on testing methodologies, which prepares readers for real-world security challenges. By the end of this book, you will be a confident Java security champion. You will understand how to exploit vulnerabilities to mimic real-world attacks, enabling you to proactively patch weaknesses before malicious actors can exploit them. KEY FEATURES ? Learn penetration testing basics for Java applications.? Discover web vulnerabilities, testing techniques, and secure coding practices.? Explore Java Android security, SAST, DAST, and vulnerability mitigation.
WHAT YOU WILL LEARN? Study the OWASP Top 10 and penetration testing methods.? Gain secure coding and testing techniques for vulnerabilities like XSS and CORS.? Find out about authentication, cookie management, and secure session practices.? Master access control and authorization testing, including IDOR and privilege escalation.? Discover Android app security and tools for SAST, DAST, and exploitation.
WHO THIS BOOK IS FORThis book is for Java developers, software developers, application developers, quality engineers, software testing teams, and security analysts. Prior knowledge of Java is required. Some application security knowledge is helpful.
Proxy tools like Burp Suite and OWASP Zap are shown, offering insights into their configurations and capabilities for web application testing. Each chapter does a deep dive into specific vulnerabilities and attack vectors associated with Java web and mobile applications. Key topics include SQL injection, cross-site scripting (XSS), authentication flaws, and session management issues. Each chapter supplies background information, testing examples, and practical secure coding advice to prevent these vulnerabilities.
There is a distinct focus on hands-on testing methodologies, which prepares readers for real-world security challenges. By the end of this book, you will be a confident Java security champion. You will understand how to exploit vulnerabilities to mimic real-world attacks, enabling you to proactively patch weaknesses before malicious actors can exploit them. KEY FEATURES ? Learn penetration testing basics for Java applications.? Discover web vulnerabilities, testing techniques, and secure coding practices.? Explore Java Android security, SAST, DAST, and vulnerability mitigation.
WHAT YOU WILL LEARN? Study the OWASP Top 10 and penetration testing methods.? Gain secure coding and testing techniques for vulnerabilities like XSS and CORS.? Find out about authentication, cookie management, and secure session practices.? Master access control and authorization testing, including IDOR and privilege escalation.? Discover Android app security and tools for SAST, DAST, and exploitation.
WHO THIS BOOK IS FORThis book is for Java developers, software developers, application developers, quality engineers, software testing teams, and security analysts. Prior knowledge of Java is required. Some application security knowledge is helpful.