XSS attacks: cross-site scripting exploits and defense
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index |
Beschreibung: | 1 Online-Ressource (xiv, 448 p.) |
ISBN: | 0080553400 1597491543 9780080553405 9781597491549 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043085694 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080553400 |c electronic bk. |9 0-08-055340-0 | ||
020 | |a 1597491543 |9 1-59749-154-3 | ||
020 | |a 9780080553405 |c electronic bk. |9 978-0-08-055340-5 | ||
020 | |a 9781597491549 |9 978-1-59749-154-9 | ||
035 | |a (OCoLC)182761515 | ||
035 | |a (DE-599)BVBBV043085694 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a XSS attacks |b cross-site scripting exploits and defense |c Jeremiah Grossman ... [et al.] |
246 | 1 | 3 | |a Cross-site scripting exploits and defense |
264 | 1 | |a Burlington, Mass. |b Syngress |c c2007 | |
300 | |a 1 Online-Ressource (xiv, 448 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin | ||
500 | |a Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Web sites / Security measures |2 fast | |
650 | 7 | |a World Wide Web / Security measures |2 fast | |
650 | 4 | |a World Wide Web |x Security measures | |
650 | 4 | |a Web sites |x Security measures | |
700 | 1 | |a Grossman, Jeremiah |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028509886 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175481776373760 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043085694 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)182761515 (DE-599)BVBBV043085694 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02964nmm a2200481zc 4500</leader><controlfield tag="001">BV043085694</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553400</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055340-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491543</subfield><subfield code="9">1-59749-154-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553405</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055340-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491549</subfield><subfield code="9">978-1-59749-154-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)182761515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043085694</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">XSS attacks</subfield><subfield code="b">cross-site scripting exploits and defense</subfield><subfield code="c">Jeremiah Grossman ... [et al.]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cross-site scripting exploits and defense</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 448 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World Wide Web / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grossman, Jeremiah</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028509886</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043085694 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:59Z |
institution | BVB |
isbn | 0080553400 1597491543 9780080553405 9781597491549 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028509886 |
oclc_num | 182761515 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 448 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman ... [et al.] Cross-site scripting exploits and defense Burlington, Mass. Syngress c2007 1 Online-Ressource (xiv, 448 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross-site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures Grossman, Jeremiah Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408 Aggregator Volltext |
spellingShingle | XSS attacks cross-site scripting exploits and defense COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures |
title | XSS attacks cross-site scripting exploits and defense |
title_alt | Cross-site scripting exploits and defense |
title_auth | XSS attacks cross-site scripting exploits and defense |
title_exact_search | XSS attacks cross-site scripting exploits and defense |
title_full | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman ... [et al.] |
title_fullStr | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman ... [et al.] |
title_full_unstemmed | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman ... [et al.] |
title_short | XSS attacks |
title_sort | xss attacks cross site scripting exploits and defense |
title_sub | cross-site scripting exploits and defense |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Web sites / Security measures World Wide Web / Security measures World Wide Web Security measures Web sites Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211408 |
work_keys_str_mv | AT grossmanjeremiah xssattackscrosssitescriptingexploitsanddefense AT grossmanjeremiah crosssitescriptingexploitsanddefense |