The tangled Web: a guide to securing modern Web applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
c2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (p. [269]-282) and index Security in the world of Web applications -- It starts with a URL -- Hypertext transfer protocol -- Hypertext markup language -- Cascading style sheets -- Browser-side scripts -- Non-HTML document types -- Content rendering with browser plug-ins -- Content isolation logic -- Origin inheritance -- Life outside same-origin rules -- Other security boundaries -- Content recognition mechanisms -- Dealing with rogue scripts -- Extrinsic site privileges -- New and upcoming security features -- Other browser mechanisms of note -- Common Web vulnerabilities "Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: perform common but surprisingly complex tasks such as URL parsing and HTML sanitization; use modern security features like Strict Transport Security, CSP, and CORS; leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs; build mashups and embed gadgets without getting stung by the tricky frame navigation policy; embed or host user-supplied content without running into the trap of content sniffing. For quick reference, 'Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"--Provided by publisher |
Beschreibung: | 1 Online-Ressource (xix, 299 p.) |
ISBN: | 1593274173 9781593274177 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043082987 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 1593274173 |c electronic bk. |9 1-59327-417-3 | ||
020 | |a 9781593274177 |c electronic bk. |9 978-1-59327-417-7 | ||
035 | |a (OCoLC)781636173 | ||
035 | |a (DE-599)BVBBV043082987 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 252 |0 (DE-625)143627: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Zalewski, Michal |e Verfasser |4 aut | |
245 | 1 | 0 | |a The tangled Web |b a guide to securing modern Web applications |c by Michal Zalewski |
264 | 1 | |a San Francisco |b No Starch Press |c c2012 | |
300 | |a 1 Online-Ressource (xix, 299 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. [269]-282) and index | ||
500 | |a Security in the world of Web applications -- It starts with a URL -- Hypertext transfer protocol -- Hypertext markup language -- Cascading style sheets -- Browser-side scripts -- Non-HTML document types -- Content rendering with browser plug-ins -- Content isolation logic -- Origin inheritance -- Life outside same-origin rules -- Other security boundaries -- Content recognition mechanisms -- Dealing with rogue scripts -- Extrinsic site privileges -- New and upcoming security features -- Other browser mechanisms of note -- Common Web vulnerabilities | ||
500 | |a "Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: perform common but surprisingly complex tasks such as URL parsing and HTML sanitization; use modern security features like Strict Transport Security, CSP, and CORS; leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs; build mashups and embed gadgets without getting stung by the tricky frame navigation policy; embed or host user-supplied content without running into the trap of content sniffing. For quick reference, 'Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"--Provided by publisher | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Viruses |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Network Protocols |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Web / Web Programming |2 bisacsh | |
650 | 7 | |a COMPUTERS / Web / Browsers |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 sears | |
650 | 7 | |a Computer security |2 sears | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Browsers (Computer programs) |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Browsers (Computer programs) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59327-388-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59327-388-0 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028507179 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175476612136960 |
---|---|
any_adam_object | |
author | Zalewski, Michal |
author_facet | Zalewski, Michal |
author_role | aut |
author_sort | Zalewski, Michal |
author_variant | m z mz |
building | Verbundindex |
bvnumber | BV043082987 |
classification_rvk | ST 252 ST 277 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)781636173 (DE-599)BVBBV043082987 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05367nmm a2200733zc 4500</leader><controlfield tag="001">BV043082987</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593274173</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59327-417-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593274177</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59327-417-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)781636173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043082987</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 252</subfield><subfield code="0">(DE-625)143627:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zalewski, Michal</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The tangled Web</subfield><subfield code="b">a guide to securing modern Web applications</subfield><subfield code="c">by Michal Zalewski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 299 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. [269]-282) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Security in the world of Web applications -- It starts with a URL -- Hypertext transfer protocol -- Hypertext markup language -- Cascading style sheets -- Browser-side scripts -- Non-HTML document types -- Content rendering with browser plug-ins -- Content isolation logic -- Origin inheritance -- Life outside same-origin rules -- Other security boundaries -- Content recognition mechanisms -- Dealing with rogue scripts -- Extrinsic site privileges -- New and upcoming security features -- Other browser mechanisms of note -- Common Web vulnerabilities</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: perform common but surprisingly complex tasks such as URL parsing and HTML sanitization; use modern security features like Strict Transport Security, CSP, and CORS; leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs; build mashups and embed gadgets without getting stung by the tricky frame navigation policy; embed or host user-supplied content without running into the trap of content sniffing. For quick reference, 'Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Viruses</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Network Protocols</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / Web Programming</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / Browsers</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Browsers (Computer programs)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Browsers (Computer programs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59327-388-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59327-388-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028507179</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043082987 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:54Z |
institution | BVB |
isbn | 1593274173 9781593274177 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028507179 |
oclc_num | 781636173 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xix, 299 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | No Starch Press |
record_format | marc |
spelling | Zalewski, Michal Verfasser aut The tangled Web a guide to securing modern Web applications by Michal Zalewski San Francisco No Starch Press c2012 1 Online-Ressource (xix, 299 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. [269]-282) and index Security in the world of Web applications -- It starts with a URL -- Hypertext transfer protocol -- Hypertext markup language -- Cascading style sheets -- Browser-side scripts -- Non-HTML document types -- Content rendering with browser plug-ins -- Content isolation logic -- Origin inheritance -- Life outside same-origin rules -- Other security boundaries -- Content recognition mechanisms -- Dealing with rogue scripts -- Extrinsic site privileges -- New and upcoming security features -- Other browser mechanisms of note -- Common Web vulnerabilities "Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: perform common but surprisingly complex tasks such as URL parsing and HTML sanitization; use modern security features like Strict Transport Security, CSP, and CORS; leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs; build mashups and embed gadgets without getting stung by the tricky frame navigation policy; embed or host user-supplied content without running into the trap of content sniffing. For quick reference, 'Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"--Provided by publisher COMPUTERS / Internet / Security bisacsh COMPUTERS / Security / Viruses bisacsh COMPUTERS / Networking / General bisacsh COMPUTERS / Networking / Network Protocols bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Security / Cryptography bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Web / Browsers bisacsh Computer networks / Security measures sears Computer security sears Computer networks / Security measures local Browsers (Computer programs) local Computer security local Computer networks Security measures Browsers (Computer programs) Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Erscheint auch als Druck-Ausgabe, Paperback 1-59327-388-6 Erscheint auch als Druck-Ausgabe, Paperback 978-1-59327-388-0 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Zalewski, Michal The tangled Web a guide to securing modern Web applications COMPUTERS / Internet / Security bisacsh COMPUTERS / Security / Viruses bisacsh COMPUTERS / Networking / General bisacsh COMPUTERS / Networking / Network Protocols bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Security / Cryptography bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Web / Browsers bisacsh Computer networks / Security measures sears Computer security sears Computer networks / Security measures local Browsers (Computer programs) local Computer security local Computer networks Security measures Browsers (Computer programs) Computer security Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4308416-3 |
title | The tangled Web a guide to securing modern Web applications |
title_auth | The tangled Web a guide to securing modern Web applications |
title_exact_search | The tangled Web a guide to securing modern Web applications |
title_full | The tangled Web a guide to securing modern Web applications by Michal Zalewski |
title_fullStr | The tangled Web a guide to securing modern Web applications by Michal Zalewski |
title_full_unstemmed | The tangled Web a guide to securing modern Web applications by Michal Zalewski |
title_short | The tangled Web |
title_sort | the tangled web a guide to securing modern web applications |
title_sub | a guide to securing modern Web applications |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Security / Viruses bisacsh COMPUTERS / Networking / General bisacsh COMPUTERS / Networking / Network Protocols bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Security / Cryptography bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Web / Browsers bisacsh Computer networks / Security measures sears Computer security sears Computer networks / Security measures local Browsers (Computer programs) local Computer security local Computer networks Security measures Browsers (Computer programs) Computer security Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Security / Viruses COMPUTERS / Networking / General COMPUTERS / Networking / Network Protocols COMPUTERS / Security / General COMPUTERS / Security / Cryptography COMPUTERS / Networking / Security COMPUTERS / Web / Web Programming COMPUTERS / Web / Browsers Computer networks / Security measures Computer security Browsers (Computer programs) Computer networks Security measures Computersicherheit Datensicherung Internet |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440083 |
work_keys_str_mv | AT zalewskimichal thetangledwebaguidetosecuringmodernwebapplications |