Hacking exposed Web 2.0: Web 2.0 security secrets and solutions

Book Cover
Average Rating
Publisher:
McGraw-Hill,
Pub. Date:
c2008.
Language:
English
Description

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

  • Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
  • Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
  • Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
  • Circumvent XXE, directory traversal, and buffer overflow exploits
  • Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
  • Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
  • Use input validators and XML classes to reinforce ASP and .NET security
  • Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
  • Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
  • Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks
Also in this Series
More Like This
Reviews from GoodReads
Loading GoodReads Reviews.
Staff View

Grouping Information

Grouped Work ID aad396e8-cb10-92c8-2b36-a8a392f923ba
full_title hacking exposed web 2 0 web 2 0 security secrets and solutions
author cannings rich
grouping_category book
lastUpdate 2017-08-14 05:04:28AM

Solr Details

_version_ 1576511975109689344
accelerated_reader_interest_level
accelerated_reader_point_value 0
accelerated_reader_reading_level 0
auth_author2 Dwivedi, Himanshu., Lackey, Zane.
author Cannings, Rich.
author-letter Cannings, Rich.
author2 Dwivedi, Himanshu., Lackey, Zane., NetLibrary, Inc.
author2-role Dwivedi, Himanshu., Lackey, Zane., NetLibrary, Inc.
author_additional Rich Cannings, Himanshu Dwivedi, Zane Lackey.
author_display Cannings, Rich
availability_toggle_arlington Available Now, Available Online, Entire Collection
callnumber-a TK5105.59
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
days_since_added 3156
detailed_location_arlington EBSCOhost
display_description
econtent_protection_type_arlington external
econtent_source_arlington EBSCOhost
format_arlington eBook
format_boost 10
format_category_arlington eBook
grouping_category book
id aad396e8-cb10-92c8-2b36-a8a392f923ba
isbn 9780071595483
item_details external_econtent:ils:.b13038783||EBSCOhost|Online|eBook|eBook|1|false|true|EBSCOhost||http://www.netlibrary.com.library.access.arlingtonva.us/urlapi.asp?action=summary&v=1&bookid=218961||Available Online||q||
itype_arlington eCollection
language English
language_boost 10
language_boost_es 1
lexile_score -1
lib_boost_arlington 50
literary_form Other
literary_form_full Other
local_callnumber_arlington Online
local_callnumber_exact_arlington Online
local_callnumber_left_arlington Online
local_days_since_added_arlington 3156
num_holdings 0
oclc (OCoLC)192043588
owning_library_arlington Arlington Public Library Online, Aurora Hills Online, Central Online, Cherrydale Online, Columbia Pike Online, Connection Crystal City Online, Detention Center Online, Glencarlyn Online, Local History Online, Plaza Online, Shirlington Online, Westover Online
popularity 0
primary_isbn 9780071595483
publishDate 2008
publishDateSort 2008
publisher McGraw-Hill,
rating 2.5
rating_facet oneStar, twoStar
record_details external_econtent:ils:.b13038783|eBook|eBook||English|McGraw-Hill,|c2008.|
recordtype grouped_work
scope_has_related_records a, arlington, c, d, g, h, o, p, s, u, v, w
scoping_details_arlington external_econtent:ils:.b13038783||Available Online|Available Online|false|true|false|false|false|true||||
subject_facet Ajax (Web site development technology), Computer networks -- Security measures, Web sites -- Security measures
target_audience Other
target_audience_full Other
title Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
title_display Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
title_full Hacking exposed Web 2.0 [electronic resource] : Web 2.0 security secrets and solutions / Rich Cannings, Himanshu Dwivedi, Zane Lackey
title_short Hacking exposed Web 2.0
title_sort hacking exposed web 20 web 20 security secrets and solutions
title_sub Web 2.0 security secrets and solutions