search for books and compare prices
cover image
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 Proceedings
By Somesh Jha (editor) and Anish Mathuria (editor)
Price
Store
Arrives
Preparing
Shipping

Jump quickly to results on these stores:

The price is the lowest for any condition, which may be new or used; other conditions may also be available.
Jump down to see edition details for: Paperback
Bibliographic Detail
Publisher Springer-Verlag New York Inc
Publication date December 23, 2010
Pages 260
Binding Paperback
Book category Adult Non-Fiction
ISBN-13 9783642177132
ISBN-10 3642177131
Dimensions 0.50 by 5.75 by 9 in.
Published in Europe
Original list price $89.99
Summaries and Reviews
Amazon.com description: Product Description: 2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoillegallymanipulatedatabase byinjectingmalicious SQL codes into the values of input parameters of http requests sentto the victim web site. 1: Fig.1. An example of a program written in PHP which contains SQL Injection v- nerability Figure 1 showsaprogram that uses the database query function mysql query togetuserinformationcorrespondingtothe userspeci?edby the GETinput- rameterusername andthen printtheresultto the clientbrowser.Anormalhttp request with the input parameter username looks like http: //example.com/ index.php?username=bob . The dynamically created database query at line2 is SELECT * FROM users WHERE username= bob AND usertype= user . Thisprogram is vulnerabletoSQLInjection attacks because mysql query uses the input value of username without sanitizingmalicious codes. A malicious code can be a stringthatcontains SQL symbols ork- words.Ifan attacker sendarequest with SQL code ( alice ) - jected http: //example.com/index.php?username=alice, the query becomes SELECT* FROM users WHERE username= alice -- AND usertype= user ."

Editions
Paperback
Book cover for 9783642177132
 
The price comparison is for this edition
from Springer-Verlag New York Inc (December 23, 2010)
9783642177132 | details & prices | 260 pages | 5.75 × 9.00 × 0.50 in. | 0.95 lbs | List price $89.99
About: 2.

Pricing is shown for items sent to or within the U.S., excluding shipping and tax. Please consult the store to determine exact fees. No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. isbn.nu is not a bookseller, just an information source.