Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
The Web Application Hacker's Handbook - Discovering and Explo
Infohash:
874576AD738593D44A765B4249FB97143D1126A0
Type:
Books
Title:
The Web Application Hacker's Handbook - Discovering and Explo
Category:
Other/E-books
Uploaded:
2010-02-14 (by ZADThe)
Description:
This book is a practical guide to discovering and exploiting security flaws in
web applications. By “web application†we mean an application that is accessed
by using a web browser to communicate with a web server. We examine a wide
variety of different technologies, such as databases, file systems, and web services,
but only in the context in which these are employed by web applications.
If you want to learn how to run port scans, attack firewalls, or break into
servers in other ways, we suggest you look elsewhere. But if you want to know
how to hack into a web application, steal sensitive data, and perform unauthorized
actions, then this is the book for you. There is enough that is interesting
and fun to say on that subject without straying into any other territory.
Tags:
Files count:
1
Size:
10.97 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
GeekHillbilly (2010-02-14)
Thanxkayen123 (2012-12-27)
Great upload, thanks.Files:
1. The Web Application Hacker's Handbook - Discovering and Exploiting Security Flaws.pdf 10.97 Mb