dc.contributor.author |
Hammoud, Ahmad |
|
dc.date.accessioned |
2011-10-18T05:48:25Z |
|
dc.date.available |
2011-10-18T05:48:25Z |
|
dc.date.copyright |
2006 |
en_US |
dc.date.issued |
2011-10-18 |
|
dc.date.submitted |
2006-09-21 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/802 |
|
dc.description |
Includes bibliographical references (leaves 191-192) and index. |
en_US |
dc.description.abstract |
Web applications are vulnerable by nature because they are available 2417
and can be accessed from anywhere. Countermeasures should be taken
to prevent hackers from launching any attack. In this study, the worst
Web vulnerabilities are demonstrated and corresponding solutions are proposed. These
vulnerabilities include SQL injections, hard-coded constants, and parameter tampering.
New techniques, such as Fake Passwords and Efficient Exposed Encryption, are introduced.
This document is rich in terms of best practices in the context of Web development. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Web sites -- Security measures |
en_US |
dc.subject |
Computer security |
en_US |
dc.subject |
Computer hackers |
en_US |
dc.title |
Securing web applications. (c2006) |
en_US |
dc.type |
Thesis |
en_US |
dc.title.subtitle |
Countermeasures for developers to overcome worst web applications vulnerabilities |
en_US |
dc.term.submitted |
Summer II |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.commembers |
Dr. Samer Habre |
|
dc.author.commembers |
Dr. Abdul Nasser Kassar |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: xviii, 214 leaves; ill.; 30 cm. Available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi Haraty |
|
dc.identifier.doi |
https://doi.org/10.26756/th.2006.38 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |