• Dansk
  • English

term.subject="hacking"

Afgræns din søgning

Materialetype
Emne
Forfatter
Årstal
Sprog
Kilde
Kategori
Set sort order for search result
HjemmeHjemme
UdlåntUdlånt
Kan ikke reserveresKan ikke reserveres
Læs på biblioteketLæs på biblioteket
Vis antal:102550
  1. Web application security : exploitation and countermeasures for modern web applications

    • Bog
    19.625 HOF

    Web application security : exploitation and countermeasures for modern web applications

    2020
    While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications - including those you don’t have direct access to. You’ll also learn how to break into web applications using the latest hacking techniques. Finally, you’ll learn how to develop mitigations for use in your own web applications to protect against hackers.
    Find den her
    Detaljer
    Haves: 
    830380-katalog:126804547|980|.
    Note: 
    Indhold: The History of Software Security ; Introduction to Web Application Reconnaissance ; The Structure of a Modern Web Application ; Finding Subdomains ; API Analysis ; Identifying Third-Party Dependencies ; Identifying Weak Points in Application Architecture ; Part I Summary ; Introduction to Hacking Web Applications ; Cross-Site Scripting (XSS) ; Cross-Site Request Forgery (CSRF) ; XML External Entity (XXE) ; Injection ; Denial of Service (DoS) ; Exploiting Third-Party Dependencies ; Part II Summary ; Securing Modern Web Applications ; Secure Application Architecture ; Reviewing Code for Security ; Vulnerability Discovery ; Vulnerability Management ; Defending Against XSS Attacks ; Defending Against CSRF Attacks ; Defending Against XXE ; Defending Against Injection ; Defending Against DoS ; Securing Third-Party Dependencies ; Part III Summary ; Conclusion
    ISBN nr.: 
    9781492053118
    Omfang: 
    xxviii, 298 sider
    Udgiver: 
    O'Reilly Media
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:126804547|980|a
  2. Cracking codes with Python : an introduction to building and breaking ciphers

    • Bog
    19.6532 PYT
    Python

    Cracking codes with Python : an introduction to building and breaking ciphers

    2018
    Summary: "Presents a crash course in Python programming, followed by instructions for making, testing, and hacking classic cipher programs, from the Caesar cipher to public key cryptography and the RSA cipher"--
    Find den her
    Detaljer
    Haves: 
    830380-katalog:126480849|980|.
    Note: 
    Making paper cryptography tools -- Programming in the interactive shell -- Strings and writing programs -- The reverse cipher -- The Caesar Cipher -- Hacking the Caesar Cipher with the brute-force technique -- Encrypting with the transposition cipher -- Decrypting with the transposition cipher -- Programming a program to test your program -- Encrypting and decrypting files -- Detecting English programmatically -- Hacking the transposition cipher -- A modular arithmetic module for the affine ciphers -- Programming the affine cipher -- Hacking the affine cipher -- Programming the simple substitution cipher -- Hacking the simple substitution cipher -- Programming the vigenere cipher -- Frequency analysis -- Hacking the vigenere cipher -- The one-time pad cipher -- Finding and generating prime numbers -- Generating keys for the public key cipher -- Programming the Public key cipher -- Appendix: Debugging Python code
    ISBN nr.: 
    9781593278229
    Omfang: 
    xxviii, 387 sider
    Udgiver: 
    No Starch Press
    Målgruppe: 
    voksenmaterialer
    Haves:: 
    830380-katalog:126480849|980|a
  3. Usynlige tyveknægte

    • Avisartikel

    Usynlige tyveknægte

    I: Weekendavisen, 2020-12-30, S. 10
    Hackere er brudt ind i en række amerikanske ministerier samt flere af de virksomheder, der ifølge US Fortune 500-listen klarer sig bedst. Ingen ved, hvem de er, eller hvad de har taget. Sikkerhedseksperter peger på, at hacking af SolarWinds Orion-software må have krævet så mange ressourcer og så stor ekspertise, at der nødvendigvis må stå en fremmed regering bag
    Find den her
    Detaljer
    Haves: 
    870971-avis:38587099|980|.
    Omfang: 
    S. 10
    Målgruppe: 
    gymnasieniveau, alment niveau, voksenmaterialer
    Findes i: 
    Weekendavisen, 2020-12-30
    Haves:: 
    870971-avis:38587099|980|a
  4. Nu skal AI styrke sikkerheden - men det ved hackerne godt

    • Tidsskriftsartikel

    Nu skal AI styrke sikkerheden - men det ved hackerne godt

    I: AOD (Audio Media), 2020, nr. 13, S. 52-53
    Fordele og ulemper ved brug af kunstig intelligens i forbindelse med datasikkerhed
    Find den her
    Detaljer
    Haves: 
    870971-tsart:38335685|980|.
    Omfang: 
    S. 52-53
    Målgruppe: 
    alment niveau, voksenmaterialer
    Findes i: 
    AOD (Audio Media), 2020, nr. 13
    Haves:: 
    870971-tsart:38335685|980|a
  5. Jeg fik en brændt cd-rom af min far i år 2000 - den førte mig til historien om, hvordan Danmarks første pirater ændrede internettet

    • Tidsskriftsartikel

    Jeg fik en brændt cd-rom af min far i år 2000 - den førte mig til historien om, hvordan Danmarks første pirater ændrede internettet

    I: Zetland online, 2020-09-21,
    I vores ellers samvittighedsfulde danske artigper-kultur findes der få ulovlige handlinger så normaliseret som at piratkopiere. Her er historien om, hvordan Danmark blev en nation af pirater
    Find den her
    Detaljer
    Haves: 
    870971-tsart:48910149|980|.
    Målgruppe: 
    gymnasieniveau, alment niveau, voksenmaterialer
    Findes i: 
    Zetland online, 2020-09-21
    Haves:: 
    870971-tsart:48910149|980|a
  6. Real-world bug hunting : a field guide to web hacking

    • Bog
    19.625 YAW

    Real-world bug hunting : a field guide to web hacking

    2019
    Summary: "Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbucks. As you read each report, you'll gain deeper insight into how the vulnerabilities work and how you might find similar ones. Each chapter begins with an explanation of a vulnerability type, then moves into a series of real bug bounty reports that show how the bugs were found. You'll learn things like how Cross-Site Request Forgery tricks users into unknowingly submitting information to websites they are logged into; how to pass along unsafe JavaScript to execute Cross-Site Scripting; how to access another user's data via Insecure Direct Object References; how to trick websites into disclosing information with Server Side Request Forgeries; and how bugs in application logic can lead to pretty serious vulnerabilities. Yaworski also shares advice on how to write effective vulnerability reports and develop relationships with bug bounty programs, as well as recommends hacking tools that can make the job a little easier"
    Find den her
    Detaljer
    Haves: 
    830380-katalog:126628307|980|.
    Note: 
    Indhold: Introduction (Who Should Read This Book ; How to Read This Book ; What’s in This Book ; A Disclaimer About Hacking) ; Bug Bounty Basics (Vulnerabilities and Bug Bounties ; Client and Server ; What Happens When You Visit a Website ; HTTP Requests ; Summary) ; Open Redirect (How Open Redirects Work ; Shopify Theme Install Open Redirect ; Shopify Login Open Redirect ; HackerOne Interstitial Redirect ; Summary) ; HTTP Parameter Pollution (Server-Side HPP ; Client-Side HPP ; HackerOne Social Sharing Buttons ; Twitter Unsubscribe Notifications ; Twitter Web Intents ; Summary) ; Cross-Site Request Forgery (Authentication ; CSRF with GET Requests ; CSRF with POST Requests ; Defenses Against CSRF Attacks ; Shopify Twitter Disconnect ; Change Users Instacart Zones ; Badoo Full Account Takeover ; Summary) ; HTML Injection and Content Spoofing (Coinbase Comment Injection Through Character Encoding ; HackerOne Unintended HTML Inclusion ; HackerOne Unintended HTML Include Fix Bypass ; Within Security Content Spoofing ; Summary) ; Carriage Return Line Feed Injection (HTTP Request Smuggling ; v.shopify.com Response Splitting ; Twitter HTTP Response Splitting ; Summary) ; Cross-Site Scripting (Types of XSS ; Shopify Wholesale ; Shopify Currency Formatting ; Yahoo! Mail Stored XSS ; Google Image Search ; Google Tag Manager Stored XSS ; United Airlines XSS ; Summary) ; Template Injections (Server-Side Template Injections ; Client-Side Template Injections ; Uber AngularJS Template Injection ; Uber Flask Jinja2 Template Injection ; Rails Dynamic Render ; Unikrn Smarty Template Injection ; Summary) ; SQL Injection (SQL Databases ; Countermeasures Against SQLi ; Yahoo! Sports Blind SQLi ; Uber Blind SQLi ; Drupal SQLi ; Summary) ; Server-Side Request Forgery (Demonstrating the Impact of Server-Side Request Forgery ; Invoking GET vs. POST Requests ; Performing Blind SSRFs ; Attacking Users with SSRF Responses ; ESEA SSRF and Querying AWS Metadata ; Google Internal DNS SSRF ; Internal Port Scanning Using Webhooks ; Summary) ; XML External Entity (eXtensible Markup Language ; How XXE Attacks Work ; Read Access to Google ; Facebook XXE with Microsoft Word ; Wikiloc XXE ; Summary) ; Remote Code Execution (Executing Shell Commands ; Executing Functions ; Strategies for Escalating Remote Code Execution ; Polyvore ImageMagick ; Algolia RCE on facebooksearch.algolia.com ; RCE Through SSH ; Summary) ; Memory Vulnerabilities (Buffer Overflows ; Read Out of Bounds ; PHP ftp_genlist() Integer Overflow ; Python Hotshot Module ; Libcurl Read Out of Bounds ; Summary) ; Subdomain Takeover (Understanding Domain Names ; How Subdomain Takeovers Work ; Ubiquiti Subdomain Takeover ; Scan.me Pointing to Zendesk ; Shopify Windsor Subdomain Takeover ; Snapchat Fastly Takeover ; Legal Robot Takeover ; Uber SendGrid Mail Takeover ; Summary) ; Race Conditions (Accepting a HackerOne Invite Multiple Times ; Exceeding Keybase Invitation Limits ; HackerOne Payments Race Condition ; Shopify Partners Race Condition ; Summary) ; Insecure Direct Object References (Finding Simple IDORs ; Finding More Complex IDORs ; Binary.com Privilege Escalation ; Moneybird App Creation ; Twitter Mopub API Token Theft ; ACME Customer Information Disclosure ; Summary) ; OAuth Vulnerabilities (The OAuth Workflow ; Stealing Slack OAuth Tokens ; Passing Authentication with Default Passwords ; Stealing Microsoft Login Tokens ; Swiping Facebook Official Access Tokens ; Summary) ; Application Logic and Configuration Vulnerabilities (Bypassing Shopify Administrator Privileges ; Bypassing Twitter Account Protections ; HackerOne Signal Manipulation ; HackerOne Incorrect S3 Bucket Permissions ; Bypassing GitLab Two-Factor Authentication ; Yahoo! PHP Info Disclosure ; HackerOne Hacktivity Voting ; Accessing PornHub’s Memcache Installation ; Summary) ; Finding Your Own Bug Bounties (Reconnaissance ; Testing the Application ; Going Further ; Summary) ; Vulnerability Reports (Read the Policy ; Include Details; Then Include More ; Reconfirm the Vulnerability ; Your Reputation ; Show Respect for the Company ; Appealing Bounty Rewards ; Summary), Appendix: Tools (Web Proxies ; Subdomain Enumeration ; Discovery ; Screenshotting ; Port Scanning ; Reconnaissance ; Hacking Tools ; Mobile ; Browser Plug-Ins) ; Resources (Online Training ; Bug Bounty Platforms ; Recommended Reading ; Video Resources ; Recommended Blogs)
    ISBN nr.: 
    9781593278625, 9781593278618, 9781098122508, 1593278624, 1593278616, 109812250X
    Omfang: 
    xxv, 235 sider
    Udgiver: 
    No Starch Press
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:126628307|980|a
  7. Spotify-hackere overtog Ulriks anlæg om natten : de kan gøre det samme hos dig

    • Avisartikel

    Spotify-hackere overtog Ulriks anlæg om natten : de kan gøre det samme hos dig

    I: Politiken, 2020-02-15, Sektion 5, s. 4-6
    Flere oplever, at deres Spotify- og Netflix-profil bliver hacket af snyltere, der vil streame gratis. Fænomenet trækker tråde til mørkenettet, store hackersager - og vores udbredte brug af det samme password igen og igen
    Find den her
    Detaljer
    Haves: 
    870971-avis:47811597|980|.
    Omfang: 
    Sektion 5, s. 4-6
    Målgruppe: 
    gymnasieniveau, alment niveau, voksenmaterialer
    Findes i: 
    Politiken, 2020-02-15
    Haves:: 
    870971-avis:47811597|980|a
  8. Mens vi shopper løs hjemmefra, kæmper web-butikker med it-sikkerheden

    • Tidsskriftsartikel

    Mens vi shopper løs hjemmefra, kæmper web-butikker med it-sikkerheden

    I: Ingeniøren, 2020, nr. 13, S. 13
    En af verdens største web shopplatforme måtte tidligere i år erkende, at "ingen platform er 100 procent sikker". For nylig blev en dansk betalingsløsning afsløret i at negligere sikkerhedshuller. It-sikkerhed modulære platforme kan være fyldt med huller
    Find den her
    Detaljer
    Haves: 
    870971-tsart:48153615|980|.
    Omfang: 
    S. 13
    Målgruppe: 
    gymnasieniveau, fagligt niveau, alment niveau, voksenmaterialer
    Findes i: 
    Ingeniøren, 2020, nr. 13
    Haves:: 
    870971-tsart:48153615|980|a
  9. Lasere lurer dine assistenter

    • Tidsskriftsartikel

    Lasere lurer dine assistenter

    I: Alt om data, Årg. 38, nr. 3 (2020), S. 28-29
    Billige lasere kan beordre digitale stemmestyrede assistenter som Alexa, Siri og Google Assistant til at gøre hvad som helst selv på lang afstand og gennem lukkede vinduer
    Find den her
    Detaljer
    Haves: 
    870971-tsart:47751055|980|.
    Omfang: 
    S. 28-29
    Målgruppe: 
    gymnasieniveau, alment niveau, voksenmaterialer
    Findes i: 
    Alt om data, Årg. 38, nr. 3 (2020)
    Haves:: 
    870971-tsart:47751055|980|a
  10. Han jager nettets banditter

    • Tidsskriftsartikel

    Han jager nettets banditter

    I: Euroman, Nr. 319 (2020), S. 98-101
    Digitale banditter blver en større og større trussel for virksomheder, der kæmper i døgndrift for at holde dem ude. Til den opgave har de brug for hjælp, og mange af dem ringer til en "white hat hacker". En moderne cowboy, som udstyret med it-kundskaber ud over det normale finder svagheder i virksomheders it-systemer før skurkene
    Find den her
    Detaljer
    Haves: 
    870971-tsart:48397883|980|.
    Omfang: 
    S. 98-101
    Målgruppe: 
    gymnasieniveau, alment niveau, voksenmaterialer
    Findes i: 
    Euroman, Nr. 319 (2020)
    Haves:: 
    870971-tsart:48397883|980|a