XSS attacks: cross-site scripting exploits and defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the vario...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress
© 2007
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xiv, 448 pages) illustrations |
ISBN: | 9780080553405 0080553400 9781597491549 1597491543 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046123702 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2007 |||| o||u| ||||||eng d | ||
020 | |a 9780080553405 |9 978-0-08-055340-5 | ||
020 | |a 0080553400 |9 0-08-055340-0 | ||
020 | |a 9781597491549 |9 978-1-59749-154-9 | ||
020 | |a 1597491543 |9 1-59749-154-3 | ||
035 | |a (ZDB-33-ESD)ocn182761515 | ||
035 | |a (OCoLC)182761515 | ||
035 | |a (DE-599)BVBBV046123702 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a XSS attacks |b cross-site scripting exploits and defense |c Jeremiah Grossman [and others] |
246 | 1 | 3 | |a Cross-site scripting exploits and defense |
264 | 1 | |a Burlington, Mass. |b Syngress |c © 2007 | |
264 | 4 | |c © 2007 | |
300 | |a 1 online resource (xiv, 448 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Web sites / Security measures |2 fast | |
650 | 7 | |a World Wide Web / Security measures |2 fast | |
650 | 4 | |a World Wide Web |x Security measures | |
650 | 4 | |a Web sites |x Security measures | |
700 | 1 | |a Grossman, Jeremiah |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491549 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504155 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597491549 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180440921145344 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046123702 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn182761515 (OCoLC)182761515 (DE-599)BVBBV046123702 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02344nmm a2200469zc 4500</leader><controlfield tag="001">BV046123702</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553405</subfield><subfield code="9">978-0-08-055340-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553400</subfield><subfield code="9">0-08-055340-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491549</subfield><subfield code="9">978-1-59749-154-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491543</subfield><subfield code="9">1-59749-154-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn182761515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)182761515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046123702</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">XSS attacks</subfield><subfield code="b">cross-site scripting exploits and defense</subfield><subfield code="c">Jeremiah Grossman [and others]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cross-site scripting exploits and defense</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2007</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 448 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World Wide Web / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grossman, Jeremiah</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491549</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504155</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597491549</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046123702 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:48Z |
institution | BVB |
isbn | 9780080553405 0080553400 9781597491549 1597491543 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504155 |
oclc_num | 182761515 |
open_access_boolean | |
physical | 1 online resource (xiv, 448 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman [and others] Cross-site scripting exploits and defense Burlington, Mass. Syngress © 2007 © 2007 1 online resource (xiv, 448 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures Grossman, Jeremiah Sonstige oth http://www.sciencedirect.com/science/book/9781597491549 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | XSS attacks cross-site scripting exploits and defense COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures |
title | XSS attacks cross-site scripting exploits and defense |
title_alt | Cross-site scripting exploits and defense |
title_auth | XSS attacks cross-site scripting exploits and defense |
title_exact_search | XSS attacks cross-site scripting exploits and defense |
title_full | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman [and others] |
title_fullStr | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman [and others] |
title_full_unstemmed | XSS attacks cross-site scripting exploits and defense Jeremiah Grossman [and others] |
title_short | XSS attacks |
title_sort | xss attacks cross site scripting exploits and defense |
title_sub | cross-site scripting exploits and defense |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Web sites / Security measures fast World Wide Web / Security measures fast World Wide Web Security measures Web sites Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Web sites / Security measures World Wide Web / Security measures World Wide Web Security measures Web sites Security measures |
url | http://www.sciencedirect.com/science/book/9781597491549 |
work_keys_str_mv | AT grossmanjeremiah xssattackscrosssitescriptingexploitsanddefense AT grossmanjeremiah crosssitescriptingexploitsanddefense |