<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="titles.xsl"?>
<record
    biblionix-libraryname="Mary Riley Styles Public Library"
    biblionix-libraryid="1263"
    biblionix-libraryusername="fallschurch"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02406cam a2200289 i 4500</leader>
  <controlfield tag="001">385811087</controlfield>
  <controlfield tag="003">TxAuBib</controlfield>
  <controlfield tag="005">20190722120000.0</controlfield>
  <controlfield tag="008">181221s2019||||||||||||||||||||||||eng|u</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">2018060556</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781593278618</subfield>
    <subfield code="c">39.95</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1593278616</subfield>
    <subfield code="c">39.95</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="b">eng</subfield>
    <subfield code="e">rda</subfield>
    <subfield code="d">TxAuBib</subfield>
    <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Yaworski, Peter.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2=" ">
    <subfield code="a">Real-world bug hunting</subfield>
    <subfield code="h">[BOOK] :</subfield>
    <subfield code="b">a field guide to web hacking /</subfield>
    <subfield code="c">Peter Yaworski.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
    <subfield code="a">San Francisco : </subfield>
    <subfield code="b">No Starch Press, </subfield>
    <subfield code="c">2019.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">235 pages :</subfield>
    <subfield code="b">Illustrations ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
    <subfield code="b">txt</subfield>
    <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
    <subfield code="b">n</subfield>
    <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
    <subfield code="b">nc</subfield>
    <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to findingsoftware bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbucks. As you read each report, you'll gain deeper insight into how the vulnerabilities work and how you might find similar ones. Each chapter begins with an explanation of a vulnerability type, then moves into a series of real bug bounty reports that show how the bugs were found. You'll learnthings like how Cross-Site Request Forgery tricks users into unknowingly submitting information to websites they are logged into; how to pass along unsafe JavaScript to execute Cross-Site Scripting; how to access another user's data via Insecure Direct Object References; how to trick websites into disclosing information with Server Side Request Forgeries; and how bugs in application logic can lead to pretty serious vulnerabilities. Yaworski also shares advice on how to write effective vulnerability reports and develop relationships with bug bounty programs, as well as recommends hacking tools that can make the job a little easier"--</subfield>
    <subfield code="c">Provided by publisher.</subfield>
  </datafield>
  <datafield tag="541" ind1=" " ind2=" ">
    <subfield code="d">20190722.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Penetration testing (Computer security.)</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Web sites</subfield>
    <subfield code="x">Testing.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Debugging in computer science.</subfield>
  </datafield>
</record>