000 04142cam a2200649 a 4500
001 ocn182761515
003 OCoLC
005 20240829154049.0
006 m d
007 cr cnu---unuuu
008 071204s2007 maua o 001 0 eng d
040 _aN$T
_beng
_epn
_cN$T
_dYDXCP
_dOCLCQ
_dIDEBK
_dZCU
_dE7B
_dNRU
_dOCLCQ
_dOCLCF
_dOCLCO
_dNLGGC
_dOCLCO
_dOCLCQ
_dOCLCO
_dOPELS
_dZMC
_dDKDLA
_dOCLCO
_dUMI
_dOCLCO
_dOCLCQ
_dDEBBG
_dOCLCQ
_dD6H
_dUAB
_dOCLCQ
_dVTS
_dCEF
_dOCLCQ
_dWYU
_dJBG
_dSTF
_dLEAUB
_dM8D
_dUHL
_dOCLCQ
_dOCLCO
_dVT2
_dBRF
_dOCLCO
_dOCLCQ
_dKSU
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a162131589
_a182732367
_a488134027
_a507007882
_a647685788
_a856957781
_a931874374
_a1066443830
_a1113280599
_a1153033287
_a1206280839
020 _a9780080553405
_q(electronic bk.)
020 _a0080553400
_q(electronic bk.)
020 _a9781597491549
020 _a1597491543
035 _a211408
_b(N$T)
035 _a(OCoLC)182761515
_z(OCoLC)162131589
_z(OCoLC)182732367
_z(OCoLC)488134027
_z(OCoLC)507007882
_z(OCoLC)647685788
_z(OCoLC)856957781
_z(OCoLC)931874374
_z(OCoLC)1066443830
_z(OCoLC)1113280599
_z(OCoLC)1153033287
_z(OCoLC)1206280839
037 _a140932:141074
_bElsevier Science & Technology
_nhttp://www.sciencedirect.com
050 4 _aTK5105.59
_b.X78 2007eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
049 _aMAIN
245 0 0 _aXSS attacks :
_bcross-site scripting exploits and defense /
_cJeremiah Grossman [and others].
246 3 _aCross-site scripting exploits and defense
260 _aBurlington, Mass. :
_bSyngress,
_c©2007.
264 4 _c©2007
300 _a1 online resource (xiv, 448 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
520 _aCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin.
505 0 _aFront Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index.
588 0 _aPrint version record.
590 _aAdded to collection customer.56279.3
650 0 _aWorld Wide Web
_xSecurity measures.
_9116991
650 0 _aWeb sites
_xSecurity measures.
_9100231
650 6 _aWeb
_xSécurité
_xMesures.
_91001102
650 6 _aSites Web
_xSécurité
_xMesures.
_9109170
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aWeb sites
_xSecurity measures
_2fast
_9100231
650 7 _aWorld Wide Web
_xSecurity measures
_2fast
_9116991
700 1 _aGrossman, Jeremiah.
_9116995
758 _ihas work:
_aXSS attacks (Text)
_1https://id.oclc.org/worldcat/entity/E39PCH4RRYtKcjKhgJyrmHRxWC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tXSS attacks.
_dBurlington, Mass. : Syngress, ©2007
_z9781597491549
_z1597491543
_w(DLC) 2007276594
_w(OCoLC)144227881
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408
938 _aebrary
_bEBRY
_nebr10201847
938 _aEBSCOhost
_bEBSC
_n211408
938 _aYBP Library Services
_bYANK
_n2737750
994 _a92
_bN$T
999 _c684618
_d684618