Text
Hacking web apps: detecting and preventing web application security problems
Terdapat indeks.
Table of Contents:
Chapter 1. HTML5
The New Document Object Model (DOM)
Cross-Origin Resource Sharing (CORS)
WebSockets
Web Storage
Web Workers
Flotsam & Jetsam
Chapter 2. HTML Injection & Cross-Site Scripting (XSS)
Understanding HTML Injection
Employing Countermeasures
Chapter 3. Cross-Site Request Forgery (CSRF)
Understanding Cross-Site Request Forgery
Employing Countermeasures
Chapter 4. SQL Injection & Data Store Manipulation
Understanding SQL Injection
Hacking Tangents: Mathematical and Grammatical
Breaking SQL Statements
Vivisecting the Database
Employing Countermeasures
Chapter 5. Breaking Authentication Schemes
Understanding Authentication Attacks
Employing Countermeasures
Chapter 6. Abusing Design Deficiencies
Understanding Logic & Design Attacks
Employing Countermeasures
Chapter 7. Leveraging Platform Weaknesses
Understanding the Attacks
Employing Countermeasures
Chapter 8. Browser & Privacy Attacks
Understanding Malware and Browser Attacks
Employing Countermeasures
No other version available