10.07.2015 Views

ASP Security by Soroush Dalili - Intelligent Exploit

ASP Security by Soroush Dalili - Intelligent Exploit

ASP Security by Soroush Dalili - Intelligent Exploit

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.1. خلاصه فصل:‏در اين فصل مقدماتي كه در فصول بعد از آن استفاده خواهد شد بيان گرديد.‏ برنامه هاي كاربردي تحتوب تعريف شدند و جايگاه و فوايد آنها گفته شد و بدين صورت مشخص گرديد كه امنيت آنها اهميتويژه اي دارد.‏ در پايان فصل به دليل جهتگيري پروژه روي امنيت برنامه هاي كاربردي وب به زبان هاي<strong>ASP</strong> و ،JSP مقدمه اي براي آشنايي با آن زبان ها بيان شد.‏8.1. منابع فصل:‏1. Stuttard Dafydd, Pinto Marcus, "The Web Application Hacker's HandbookDiscovering and <strong>Exploit</strong>ing <strong>Security</strong> Flaws", Wiley Publishing Inc., 20082. Shema Mike, "Hack Notes Web <strong>Security</strong> Portable Reference", McGraw-Hill/Osborne, 20033. McClure Stuart, Scambray Joel, Kurtz George, "Hacking Exposed Fifth EditionNetwork <strong>Security</strong> Secrets & Solutions", McGraw-Hill/Osborne, 20054. Ambrosch Dl Robert, "Hacking 101" Workshop, Wien, 8 Nov., 20075. Gartner, Nov 2005, http://gartner.com6. Open Web Application <strong>Security</strong> Project, http://www.owasp.org/7. http://en.wikipedia.org/8. http://www.imperva.com/application_defense_center/papers/how_safe_is_it.html9. http://www.webwizguide.com/kb/asp_tutorials/what_is_asp.asp10. http://java.sun.com/products/jsp/faq.html11. http://condor.depaul.edu/~mwright1/j2ee/12. http://j2ee.masslight.com/Chapter1.html25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!