Amazon cover image
Image from Amazon.com

XSS attacks : cross-site scripting exploits and defense / Jeremiah Grossman [and others].

Contributor(s): Material type: TextTextCopyright date: ©2007Description: 1 online resource (xiv, 448 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780080553405
  • 0080553400
  • 9781597491549
  • 1597491543
Other title:
  • Cross-site scripting exploits and defense
Subject(s): Additional physical formats: Print version:: XSS attacks.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .X78 2007eb
Online resources:
Contents:
Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index.
Summary: Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes index.

Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin.

Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index.

Print version record.

Added to collection customer.56279.3

Powered by Koha