Cross Site Scripting Attacks: Xss Exploits and Defense
2008-12-01 20:52
706 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
*XSS Vulnerabilities exist in 8 out of 10 Web sites
*The authors of this book are the undisputed industry leading authorities
*Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else
http://rapidshare.com/files/33463173/1597491543.zip http://depositfiles.com/files/926658
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
*XSS Vulnerabilities exist in 8 out of 10 Web sites
*The authors of this book are the undisputed industry leading authorities
*Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else
http://rapidshare.com/files/33463173/1597491543.zip http://depositfiles.com/files/926658
相关文章推荐
- Harvesting Cross Site Scripting (XSS) Victims - Clicks, Keystrokes and Cookies
- Cross Site Scripting - Attack and Defense guide
- Cross-Site Scripting Attacks (XSS)
- Cross Site Scripting - Attack and Defense guide
- XSS Attack Examples (Cross-Site Scripting Attacks)
- (转载)Detection of SQL Injection and Cross-site Scripting Attacks
- Detection of SQL Injection and Cross-site Scripting Attacks
- PDF Cross Site Scripting (XSS) vulnerability
- XSS (Cross-Site-Scripting)笔记
- How to Prevent Cross-Site Scripting Attacks
- 【web安全】Xss Exploits and Defense翻译3
- XSS (Cross-Site-Scripting)笔记
- 跨站脚本攻击(Cross‐Site Scripting (XSS))
- Reflected Cross Site Scripting (XSS)
- Cross-Site Scripting XSS 跨站攻击全攻略 分类: 系统架构 2015-07-08 12:25 21人阅读 评论(2) 收藏
- XSS Cross Site Scripting
- 跨站脚本攻击(Cross‐Site Scripting (XSS))实践
- XSS 跨站脚本攻击(Cross Site Scripting)
- Cross-Site Scripting XSS 跨站攻击全攻略
- 怀疑博客被XSS(Cross Site Scripting)