Professional Pen Testing for Web Applications


After a review of the basics of web applications, you’ll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.

What you will learn from this book
* Surveillance techniques that an attacker uses when targeting a system for a strike Continue reading “Professional Pen Testing for Web Applications” »

HackNotes(tm) Web Security Pocket Reference


HackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today’s Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted anti-hacking methods, bullet-proof best practices, and code-level techniques. Use the unique Reference Center in the middle of the book to access security commands, input validation checklists, tables for alternate encoding schemes, online resources, SQL injection hints, application testing methodologies, and more.. Continue reading “HackNotes(tm) Web Security Pocket Reference” »

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It


If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must chances are very high that your companies iOS applications are vulnerable to attack. Thats because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. Youll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Continue reading “Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It” »