Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
XSS attacks = cross-site scripting exploits and defense /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
XSS attacks/ Jeremiah Grossman, ... [et al.]
Reminder of title:
cross-site scripting exploits and defense /
remainder title:
Cross-site scripting attacks
other author:
Grossman, Jeremiah
Published:
Burlington, Mass. :Syngress, : c2007.,
Description:
xiv, 448 p. :ill. ; : 24 cm.;
Notes:
Includes index.
Subject:
Web sites - Security measures. -
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080553405 (electronic bk.)
XSS attacks = cross-site scripting exploits and defense /
XSS attacks
cross-site scripting exploits and defense /[electronic resource] :Cross-site scripting attacksJeremiah Grossman, ... [et al.] - Burlington, Mass. :Syngress,c2007. - xiv, 448 p. :ill. ;24 cm.
Includes index.
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. *XSS Vulnerabilities exist in 8 out of 10 Web sites *The authors of this book are the undisputed industry leading authorities *Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080553405 (electronic bk.)Subjects--Topical Terms:
641858
Web sites
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59 / .X7 2007eb
Dewey Class. No.: 005.8
XSS attacks = cross-site scripting exploits and defense /
LDR
:02528cam a22003014a 4500
001
613812
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
091218s2007 maua s 001 0 eng d
020
$a
9780080553405 (electronic bk.)
020
$a
0080553400 (electronic bk.)
020
$a
9781597491549 (paper)
020
$a
1597491543 (paper)
035
$a
(OCoLC)162131589
035
$a
ocn162131589
040
$a
OPELS
$c
OPELS
$d
OPELS
050
1 4
$a
TK5105.59
$b
.X7 2007eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
XSS attacks
$h
[electronic resource] :
$b
cross-site scripting exploits and defense /
$c
Jeremiah Grossman, ... [et al.]
246
3
$a
Cross-site scripting attacks
260
$a
Burlington, Mass. :
$c
c2007.
$b
Syngress,
300
$a
xiv, 448 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
520
$a
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. *XSS Vulnerabilities exist in 8 out of 10 Web sites *The authors of this book are the undisputed industry leading authorities *Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Web sites
$x
Security measures.
$3
641858
650
0
$a
World Wide Web
$x
Security measures.
$3
641857
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Grossman, Jeremiah
$3
641859
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491549
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491549
$z
An electronic book accessible through the World Wide Web; click for information
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login