Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
XSS attackscross-site scripting exploits and defense /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
XSS attacks/ Jeremiah Grossman, ... [et al.]
其他題名:
cross-site scripting exploits and defense /
其他題名:
Cross-site scripting attacks
其他作者:
Grossman, Jeremiah
出版者:
Burlington, Mass. :Syngress,c2007.
面頁冊數:
xiv, 448 p. :ill. ;24 cm.
附註:
Includes index.
標題:
World Wide Web - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080553405 (electronic bk.)
ISBN:
0080553400 (electronic bk.)
ISBN:
9781597491549 (paper)
ISBN:
1597491543 (paper)
XSS attackscross-site scripting exploits and defense /
XSS attacks
cross-site scripting exploits and defense /[electronic resource] :Cross-site scripting attacksJeremiah Grossman, ... [et al.] - Burlington, Mass. :Syngress,c2007. - xiv, 448 p. :ill. ;24 cm.
Includes index.
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. *XSS Vulnerabilities exist in 8 out of 10 Web sites *The authors of this book are the undisputed industry leading authorities *Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080553405 (electronic bk.)Subjects--Topical Terms:
1000060453
World Wide Web
--Security measures.Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: TK5105.59 / .X7 2007eb
Dewey Class. No.: 005.8
XSS attackscross-site scripting exploits and defense /
LDR
:02543cmm 22003014a 4500
001
1000045961
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070802s2007 maua s 001 0 eng d
020
$a
9780080553405 (electronic bk.)
020
$a
0080553400 (electronic bk.)
020
$a
9781597491549 (paper)
020
$a
1597491543 (paper)
035
$a
(OCoLC)162131589
035
$a
ocn162131589
040
$a
OPELS
$c
OPELS
$d
OPELS
050
1 4
$a
TK5105.59
$b
.X7 2007eb
082
0 4
$a
005.8
$2
22{me_controlnum}
245
0 0
$a
XSS attacks
$h
[electronic resource] :
$b
cross-site scripting exploits and defense /
$c
Jeremiah Grossman, ... [et al.]
246
3
$a
Cross-site scripting attacks
260
$a
Burlington, Mass. :
$b
Syngress,
$c
c2007.
300
$a
xiv, 448 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
520
$a
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. *XSS Vulnerabilities exist in 8 out of 10 Web sites *The authors of this book are the undisputed industry leading authorities *Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
World Wide Web
$x
Security measures.
$3
1000060453
650
0
$a
Web sites
$x
Security measures.
$3
157579
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Grossman, Jeremiah
$3
1000060452
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491549
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491549
$z
An electronic book accessible through the World Wide Web; click for information
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040118
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入