Hacking Exposed Web Applications, Third Edition and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $50.00
  • Save: $20.08 (40%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Hacking Exposed Web Appli... has been added to your Cart
FREE Shipping on orders over $35.
Used: Very Good | Details
Condition: Used: Very Good
Comment: While this book has been loved by someone else, they left it in great condition. Hurry and buy it before someone else does and take advantage of our FREE Super Saver Shipping!!!
Access codes and supplements are not guaranteed with used items.
Trade in your item
Get a $1.86
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed Web Applications, Third Edition Paperback – October 15, 2010

ISBN-13: 978-0071740647 ISBN-10: 0071740643 Edition: 3rd

Buy New
Price: $29.92
33 New from $24.55 30 Used from $10.78
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$29.92
$24.55 $10.79
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

$29.92 FREE Shipping on orders over $35. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Hacking Exposed Web Applications, Third Edition + Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions)
Price for both: $61.26

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Hacking Exposed
  • Paperback: 482 pages
  • Publisher: McGraw-Hill Osborne Media; 3 edition (October 15, 2010)
  • Language: English
  • ISBN-10: 0071740643
  • ISBN-13: 978-0071740647
  • Product Dimensions: 9.1 x 7.4 x 1 inches
  • Shipping Weight: 1.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #546,311 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Joel Scambray, CISSP, is co-founder and CEO of Consciere, provider of strategic security advisory services. He has worked in Internet security assessment and defense for nearly 15 years at Microsoft, Foundstone, Ernst & Young, and other organizations. Joel is an internationally renowned speaker and author of multiple security books, including 12 editions in the Hacking Exposed series.

Vincent Liu, CISSP, is a managing partner at Stach & Liu. He previously led the Attack & Penetration and Reverse Engineering teams at Honeywell's Global Security group, was a consultant with the Ernst & Young Advanced Security Centers, and was an analyst at the National Security Agency. Vincent speaks at industry conferences, including Black Hat, ToorCon, and Microsoft's BlueHat.

Caleb Sima is CEO of Armorize Technologies, provider of integrated Web application security solutions. He founded SPI Dynamics, a Web security technology company, and was an early innovator at Internet Security Systems/IBM's elite X-Force team. Caleb presents at key industry conferences, such as RSA and Black Hat.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Related Media


Customer Reviews

4.7 out of 5 stars
5 star
4
4 star
2
3 star
0
2 star
0
1 star
0
See all 6 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

19 of 19 people found the following review helpful By Richard Bejtlich on March 31, 2011
Format: Paperback
This is the third Hacking Exposed: Web Applications (HE:WA) book I've reviewed, having reviewed the second edition in 2006 and the first edition in 2002. While I gave the earlier editions each five stars, I don't think HE:WA3E quite meets my expectations of a five star web application security book -- at least not one bearing the Hacking Exposed (HE) series name.

In my opinion, the winning formula for a good HE book was set by the first in the series, back in 1999: 1) explain a technology of interest; 2) show exactly how to exploit it; 3) recommend countermeasures. For me, these three steps MUST be followed, and any book with HE in the title that fails to follow this recipe is likely to fall flat. The reason I like this approach is simple; in many cases, defenders first encounter a new technology only after a researcher or intruder has broken it! In other words, the offensive side is usually far ahead of the defensive side, because offenders often specialize in a promising new area and pursue it relentlessly until they break it. Good HE books help redress this imbalance by getting the defender up to speed on a new technology, showing how to break it, and then suggesting defensive measures.

I believe that while HE:WA3E adopts some of this approach, it seems to not be consistently applied. In fact, I'm wondering if the absence of Mike Shema from the author team could be the reason for this change. Mike's handiwork still appears as a legacy of using older material, but elsewhere I found myself missing the HE formula.

For example, ch 9 seems to diverge from the HE recipe. It also seemed "light" to me compared to the prevalence of client-side exploitation. When HE:WA2E arrived in 2006, client-side attacks had been popular for about three years.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By W. Vogt on December 9, 2013
Format: Paperback Verified Purchase
I learned more from this in an hour of sitting and flipping than I have from hours upon hours of searching the web for answers on similar topics. Extremely helpful book for those concerned with web security... covers topics that I've never heard others mention. Also, a lot of people online... specifically with say, PHP programming, will tell you some basic rule or procedure for verifying user input, but they don't explain fully the how and the why---it's like that all over the place---but this book does a very good job of explaining why the procedures and such in PHP or other languages are necessary, and in my case helped me to understand exactly why certain procedures should be employed. (Such as making sure user-submitted data is in the expected encoding, i.e. UTF8, etc.)
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again