header

Verification of Web Applications vulnerabilities / (Record no. 50675)

MARC details
000 -LEADER
fixed length control field 02091cam a2200313 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-GiCUC
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150428s2014 ua d f m 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GiCUC
Language of cataloging eng
Transcribing agency EG-GiCUC
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Deposite
097 ## - Thesis Degree
Thesis Level M.Sc
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC)
Classification number Cai01.18.02.M.Sc.2014.Ma.V
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Mahmoud Salah Mohamed Mubarak
245 10 - TITLE STATEMENT
Title Verification of Web Applications vulnerabilities /
Statement of responsibility, etc. Mahmoud Salah Mohamed Mubarak ; Supervised Akram Salah , Fatma A. El-Licy
246 15 - VARYING FORM OF TITLE
Title proper/short title تحقيق نقاط الضعف في تطبيقات الويب
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cairo :
Name of publisher, distributor, etc. Mahmoud Salah Mohamed Mubarak ,
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
Extent 116 Leaves :
Other physical details charts ;
Dimensions 30cm
502 ## - DISSERTATION NOTE
Dissertation note Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
520 ## - SUMMARY, ETC.
Summary, etc. Web security issues play an important role in the development of real life web systems. Malicious attacks of the web based systems, usually, inflect damages and losses in finance capitals and may, even, compromise the reputation of those institutes under attack. Web security issues include Buffer overflow, Cookie poisoning, SQL injection, Cross Site Scripting, Bypass Restrictions on Input Choices, CGI Parameters and Hidden field manipulation. Those vulnerabilities can be discovered by applying software testing techniques. The discovery of vulnerability in given software, would, normally, assist in rectifying the software as well as adjusting the design and implementation for better practice to avoid such vulnerability. Generally, white box testing techniques are adopted to expose these types of vulnerabilities. Software testing techniques are adopted, not only, to guarantee certain level of fault coverage, but also, to ensure security of the programs
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Issued also as CD
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Verification
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Vulnerabilities
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Web
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Akram Salah ,
Relator term
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Fatma A. Ellicy ,
Relator term
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Nazla
Reviser Revisor
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Soheir
Reviser Cataloger
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
Holdings
Source of classification or shelving scheme Not for loan Home library Current library Date acquired Full call number Barcode Date last seen Koha item type Copy number
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة قاعة الرسائل الجامعية - الدور الاول 11.02.2024 Cai01.18.02.M.Sc.2014.Ma.V 01010110065340000 22.09.2023 Thesis  
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة مخـــزن الرســائل الجـــامعية - البدروم 11.02.2024 Cai01.18.02.M.Sc.2014.Ma.V 01020110065340000 22.09.2023 CD - Rom 65340.CD