Hacking Exposed Web 2.0
Web 2.0 Security Secrets and Solutions
Book DescriptionProtect your Web 2.0 architecture against the
latest wave of cybercrime using expert tactics
from Internet security professionals.
Hacking Exposed Web 2.0 shows how hackers
perform reconnaissance,
choose their entry point, and attack Web 2.0
- based services, and reveals detailed
countermeasures and defense techniques.
You'll learn how to avoid injection and
buffer overflow attacks, fix browser and
plug-in flaws, and secure AJAX, Flash,
and XML-driven applications. Real-world case
studies illustrate social networking
site weaknesses, cross-site attack methods,
migration vulnerabilities, and IE
shortcomings.
Book Details
Publisher: McGraw-Hill
By: Rich Cannings,
Himanshu Dwivedi,
Zane Lackey
ISBN: 978-0-0714-9461-8
Year: 2007
Pages: 258
Language: English
File size: 6.9 MB
File format: PDF
eBook
Download: Free
Related Posts:
Hacking Exposed, 6th Edition
Hacking Exposed, 6th Edition
Network Security Secrets and Solutions
QR Code
Book Description
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the w… Read More
Windows 8 Hacks
Windows 8 Hacks
Tips & Tools for Unlocking the Power of Tablets and Desktops
QR Code
Book Description
Windows 8 is quite different than previous Microsoftoperating systems, but it's still eminently hackable.… Read More
Linux Security Secrets and Solutions
Hacking Exposed Linux, 3rd Edition
Linux Security Secrets and Solutions
Book Description
This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for I… Read More
Gray Hat Hacking, 3rd Edition
Gray Hat Hacking, 3rd Edition
The Ethical Hackers Handbook
QR Code
Book Description
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressiv… Read More
Hacking Exposed Malware and Rootkits
Hacking Exposed Malware and Rootkits
Malware & Rootkits Secrets and Solutions
QR Code
Book Description
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to t… Read More
0 comments:
Post a Comment