|
|
|
|
LEADER |
02164nmm a2200373 u 4500 |
001 |
EB002067530 |
003 |
EBX01000000000000001207620 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220922 ||| eng |
020 |
|
|
|a 9781718502451
|
020 |
|
|
|a 1718502451
|
050 |
|
4 |
|a QA76.76.A63
|
100 |
1 |
|
|a Ball, Corey
|
245 |
0 |
0 |
|a Hacking APIs
|b breaking web application programming interfaces
|c by Corey Ball
|
246 |
3 |
1 |
|a Hacking application program interfaces
|
260 |
|
|
|a San Francisco
|b No Starch Press
|c 2022
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Preparing for API security testing -- How web applications work -- The anatomy of web APIs -- API insecurities -- Setting up vulnerable API targets for testing -- Analysis and attribution -- Discovering APIs -- Endpoint analysis -- Authentication attacks -- Fuzzing -- Exploiting API authorization -- Exploiting mass assignment -- API injection -- Evasive techniques and rate limit testing -- Hacking APIs -- Breaches and bounties
|
653 |
|
|
|a Logiciels d'application / Développement
|
653 |
|
|
|a Application program interfaces (Computer software) / http://id.loc.gov/authorities/subjects/sh98004527
|
653 |
|
|
|a Application software / Development / fast
|
653 |
|
|
|a APIs (interfaces) / aat
|
653 |
|
|
|a Application program interfaces (Computer software) / fast
|
653 |
|
|
|a Interfaces de programmation d'applications
|
653 |
|
|
|a Application software / Development / http://id.loc.gov/authorities/subjects/sh95009362
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Includes index
|
776 |
|
|
|z 9781718502451
|
776 |
|
|
|z 9781718502444
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098130244/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a "Teaches how to penetration-test APIs, make APIs more secure, set up a streamlined API testing lab with Burp Suite and Postman, and master tools for reconnaissance, endpoint analysis, and fuzzing. Topics covered include REST and GraphQL APIs, API authentication mechanisms, vulnerabilities, and techniques for bypassing protections. Includes nine guided labs"--
|