Penetration Testing with Java: A step-by-step pen testing handbook for Java applications

Author:   Nancy Snoke
Publisher:   BPB Publications
ISBN:  

9789365899351


Pages:   400
Publication Date:   09 January 2025
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $90.54 Quantity:  
Add to Cart

Share |

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications


Overview

The book provides a comprehensive exploration of Java security and penetration testing, starting with foundational topics such as secure coding practices and the OWASP Top 10 for web applications. The early chapters introduce penetration testing methodologies, including Java web application-specific mapping and reconnaissance techniques. The gathering of information through OSINT and advanced search techniques is highlighted, laying the crucial groundwork for testing. Proxy tools like Burp Suite and OWASP Zap are shown, offering insights into their configurations and capabilities for web application testing.

Full Product Details

Author:   Nancy Snoke
Publisher:   BPB Publications
Imprint:   BPB Publications
ISBN:  

9789365899351


ISBN 10:   9365899354
Pages:   400
Publication Date:   09 January 2025
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

Nancy Nancy Snoke has worked in software development and security for over 17 years as a software engineer, application security engineer, private consultant, and penetration tester. has worked in software development and security for over 17 years as a software engineer, application security engineer, private consultant, and penetration tester.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

RGFEB26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List