Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...
| Main Author: | Sinha, Sanjib (Author, http://id.loc.gov/vocabulary/relators/aut) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2019.
|
| Edition: | 1st ed. 2019. |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Beginning Ethical Hacking with Kali Linux Computational Techniques for Resolving Security Issues /
by: Sinha, Sanjib, et al.
Published: (2018) -
DevOps for SharePoint With Packer, Terraform, Ansible, and Vagrant /
by: Medina, Oscar, et al.
Published: (2018) -
Build Better Chatbots A Complete Guide to Getting Started with Chatbots /
by: Khan, Rashid, et al.
Published: (2018) -
Migrating to MariaDB Toward an Open Source Database Solution /
by: Wood, William, et al.
Published: (2019) -
Introducing InnoDB Cluster Learning the MySQL High Availability Stack /
by: Bell, Charles, et al.
Published: (2018)