MARC details
000 -LEADER |
fixed length control field |
02091cam a2200313 a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
EG-GiCUC |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150428s2014 ua d f m 000 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-GiCUC |
Language of cataloging |
eng |
Transcribing agency |
EG-GiCUC |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
Deposite |
097 ## - Thesis Degree |
Thesis Level |
M.Sc |
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC) |
Classification number |
Cai01.18.02.M.Sc.2014.Ma.V |
100 0# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mahmoud Salah Mohamed Mubarak |
245 10 - TITLE STATEMENT |
Title |
Verification of Web Applications vulnerabilities / |
Statement of responsibility, etc. |
Mahmoud Salah Mohamed Mubarak ; Supervised Akram Salah , Fatma A. El-Licy |
246 15 - VARYING FORM OF TITLE |
Title proper/short title |
تحقيق نقاط الضعف في تطبيقات الويب |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cairo : |
Name of publisher, distributor, etc. |
Mahmoud Salah Mohamed Mubarak , |
Date of publication, distribution, etc. |
2014 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
116 Leaves : |
Other physical details |
charts ; |
Dimensions |
30cm |
502 ## - DISSERTATION NOTE |
Dissertation note |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Web security issues play an important role in the development of real life web systems. Malicious attacks of the web based systems, usually, inflect damages and losses in finance capitals and may, even, compromise the reputation of those institutes under attack. Web security issues include Buffer overflow, Cookie poisoning, SQL injection, Cross Site Scripting, Bypass Restrictions on Input Choices, CGI Parameters and Hidden field manipulation. Those vulnerabilities can be discovered by applying software testing techniques. The discovery of vulnerability in given software, would, normally, assist in rectifying the software as well as adjusting the design and implementation for better practice to avoid such vulnerability. Generally, white box testing techniques are adopted to expose these types of vulnerabilities. Software testing techniques are adopted, not only, to guarantee certain level of fault coverage, but also, to ensure security of the programs |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Issued also as CD |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Verification |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Vulnerabilities |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Web |
700 0# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Akram Salah , |
Relator term |
|
700 0# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Fatma A. Ellicy , |
Relator term |
|
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) |
Cataloger |
Nazla |
Reviser |
Revisor |
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) |
Cataloger |
Soheir |
Reviser |
Cataloger |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Thesis |