Hacking Exposed ™ Web 2.0 Reviews
Hacking Exposed ™ Web 2.0 Reviews
Security Secret and Solution
Author: Rich Cannings, Himanshu Dwivedi, Zane Lackey
Publisher: McGraw-Hill
ISBN: 0-07-149461-8
2008
BOOK OVERVIEW
The focus of this book is Web 2.0 application security. As mentioned, many Web 1.0
attacks are carried over to the Web 2.0 world. This book will show how this is exactly completed
specifically, how old attacks, such as XSS, will appear in Web 2.0 applications and
technologies. In addition to applying old attacks to this new technology, which is a theme in the security world, this book discusses how older technologies are being used more heavily on the web. Technologies such as ActiveX and Flash have been around for while, but they are being used more and more in Web 2.0 applications. Lastly, newer attack classes, such as cross-domain attacks, will be discussed. These attacks significantly increase the attack surface as end users can be attacked on one domain by visiting another.
Part I
Part I begins with common injection attacks. This chapter discusses injection attacks that
have been around for awhile, such as SQL injection, as well as new injection issues
prevalent in Web 2.0, such as XPath and XXE (XML eXternal Entity) attacks
Part II
The next part of the book, “Next Generation Web Application Attacks,” covers the new
attack classes that appear with Web 2.0 applications
Part III
The third part of this book is dedicated to AJAX. Since Web 2.0 web applications often
involve AJAX
Part IV
The last part of the book is on thick clients. The first chapter in this part covers ActiveX
security
Download : rapidshare
Security Secret and Solution
Author: Rich Cannings, Himanshu Dwivedi, Zane Lackey
Publisher: McGraw-Hill
ISBN: 0-07-149461-8
2008
BOOK OVERVIEW
The focus of this book is Web 2.0 application security. As mentioned, many Web 1.0
attacks are carried over to the Web 2.0 world. This book will show how this is exactly completed
specifically, how old attacks, such as XSS, will appear in Web 2.0 applications and
technologies. In addition to applying old attacks to this new technology, which is a theme in the security world, this book discusses how older technologies are being used more heavily on the web. Technologies such as ActiveX and Flash have been around for while, but they are being used more and more in Web 2.0 applications. Lastly, newer attack classes, such as cross-domain attacks, will be discussed. These attacks significantly increase the attack surface as end users can be attacked on one domain by visiting another.
Part I
Part I begins with common injection attacks. This chapter discusses injection attacks that
have been around for awhile, such as SQL injection, as well as new injection issues
prevalent in Web 2.0, such as XPath and XXE (XML eXternal Entity) attacks
Part II
The next part of the book, “Next Generation Web Application Attacks,” covers the new
attack classes that appear with Web 2.0 applications
Part III
The third part of this book is dedicated to AJAX. Since Web 2.0 web applications often
involve AJAX
Part IV
The last part of the book is on thick clients. The first chapter in this part covers ActiveX
security
Download : rapidshare
Related Books
system
- Mechanical Engineering Systems
- PLC Beginner Guide
- Digital Systems Design with FPGAs and CPLDs
- Hacker Dictionary
- .NET Domain-Driven Design with C#
- Embedded Linux Primer: A Practical, Real-World Approach
- Internet Denial of Service: Attack and Defense Mechanisms
- WiMAX/MobileFi - Advanced Research and Technology
- Windows 2000 Server Resource Kit TCP/IP Core Networking Guide
- Windows 2000 Server System Administration Handbook
- Hacking Exposed ™ Web 2.0 Reviews
- Deploying Voice over Wireless LANs
- TCP Performance over UMTS-HSDPA Systems
- Computer Security and Cryptography
- Backup and Recovery
- Integrated Security Systems Design: Concepts, Specifications, and Implementation
hacking
- Podcasting Hacks
- eBay Hacks, 2nd Edition
- Hacking For Dummies®
- Hacker Dictionary
- Hacker Linux Uncovered
- Hacking Exposed ™ Web 2.0 Reviews
- Knoppik Hacks 2nd Edition
- How to Cheat at Microsoft Vista Administration
- Computer Security and Cryptography
- Integrated Security Systems Design: Concepts, Specifications, and Implementation
- Hacking GPS
web
- Incomplete Guide to Building a Web site that Works
- 501 Web Site Secrets®: Unleash the Power of Google®, Amazon®, eBay®, and More
- Website Creation Course
- Building a Web Site For Dummies®, 2nd Edition
- .NET Domain-Driven Design with C#
- Foundation Website Creation with CSS, XHTML, and JavaScript
- Internet Denial of Service: Attack and Defense Mechanisms
- IEEE - Internet Computing
- PHP & MySQL® For Dummies® 3rd Edition
- Learning PHP and MySQL-A Step by Step Guide to Creating Dynamic Database Driven Websites
- A Designer's Guide to Adobe InDesign and XML
- Rails for PHP Developers
- Beginning PHP and MySQL: From Novice to Professional, Third Edition
- PHP 6 and MySQL 5 for Dynamic Web Sites
- PHP & MySQL® For Dummies® 3rd Edition
- Visual Basic® .NET Unleashed
- Professional IIS 7 and ASP.NET Integrated Programming
- Professional ADO.NET 2 Programming with SQL Server 2005, Oracle®, and MySQL®
- Google Web Toolkit Solutions
- Beginning Web Development, Silverlight, and ASP.NET AJAX
- SEO Search Engine Optimization Bible
- Google Web Toolkit Applications
- ASP.NET 2.0 Illustrated
- Hacking Exposed ™ Web 2.0 Reviews
- Professional Joomla!