Get Free Shipping on orders over $79
Penetration Testing with Java : A step-by-step pen testing handbook for Java applications - Nancy Snoke

Penetration Testing with Java

A step-by-step pen testing handbook for Java applications

By: Nancy Snoke

Paperback | 9 January 2025

At a Glance

Paperback


$71.49

or 4 interest-free payments of $17.87 with

 or 

Ships in 7 to 10 business days

DESCRIPTION 

The book provides a comprehensive exploration of Java security and penetration testing, starting with foundational topics such as secure coding practices and the OWASP Top 10 for web applications. The early chapters introduce penetration testing methodologies, including Java web application-specific mapping and reconnaissance techniques. The gathering of information through OSINT and advanced search techniques is highlighted, laying the crucial groundwork for testing. Proxy tools like Burp Suite and OWASP Zap are shown, offering insights into their configurations and capabilities for web application testing.

Each chapter does a deep dive into specific vulnerabilities and attack vectors associated with Java web and mobile applications. Key topics include SQL injection, cross-site scripting (XSS), authentication flaws, and session management issues. Each chapter supplies background information, testing examples, and practical secure coding advice to prevent these vulnerabilities. There is a distinct focus on hands-on testing methodologies, which prepares readers for real-world security challenges.

By the end of this book, you will be a confident Java security champion. You will understand how to exploit vulnerabilities to mimic real-world attacks, enabling you to proactively patch weaknesses before malicious actors can exploit them.

WHAT YOU WILL LEARN

â-� Study the OWASP Top 10 and penetration testing methods.

â-� Gain secure coding and testing techniques for vulnerabilities like XSS and CORS.

â-� Find out about authentication, cookie management, and secure session practices.

â-� Master access control and authorization testing, including IDOR and privilege escalation.

â-� Discover Android app security and tools for SAST, DAST, and exploitation.      

WHO THIS BOOK IS FOR

This book is for Java developers, software developers, application developers, quality engineers, software testing teams, and security analysts. Prior knowledge of Java is required. Some application security knowledge is helpful.

More in Mobile & Handheld Device Programming & Apps Programming

Coding All-in-One For Dummies : 2nd Edition - Chris Minnick

RRP $69.95

$52.75

25%
OFF
Confident Coding : How to Write Code and Futureproof Your Career - Rob Percival
Jumpstarting the Raspberry Pi Zero W - Akkana Peck

RRP $24.75

$15.75

36%
OFF
Head First Swift : Head First - Jon Manning

RRP $152.00

$73.75

51%
OFF
Tiny Machine Learning Techniques for Constrained Devices - Khalid El-Makkaoui
Head First Kotlin : A Brain-Friendly Guide - David Griffiths

RRP $152.00

$73.75

51%
OFF
Photos for Mac and iOS : The Missing Manual - Lesa Snider

RRP $66.50

$35.99

46%
OFF
iOS 11 Swift Programming Cookbook - Vandad Nahavandipoor

RRP $114.00

$55.75

51%
OFF
Learning React Native : Building Native Mobile Apps with JavaScript - Bonnie Eisenman
Serverless Single Page Apps - Ben Rady

RRP $45.75

$23.75

48%
OFF
ASP.NET MVC 5 with Bootstrap and Knockout.js - Jamie Munro

RRP $47.75

$26.75

44%
OFF
Developing Web Applications with Haskell and Yesod 2e - Michael Snoyman