Skip to content
You are not logged in |Login  

LEADER 00000cam a2200625Ia 4500 
001    ocn182761515 
003    OCoLC 
005    20160527040933.6 
006    m     o  d         
007    cr cnu---unuuu 
008    071204s2007    maua    o     001 0 eng d 
019    162131589|a182732367|a488134027|a507007882|a647685788
       |a856957781|a931874374 
020    9780080553405|q(electronic book) 
020    0080553400|q(electronic book) 
020    9781597491549 
020    1597491543 
035    (OCoLC)182761515|z(OCoLC)162131589|z(OCoLC)182732367
       |z(OCoLC)488134027|z(OCoLC)507007882|z(OCoLC)647685788
       |z(OCoLC)856957781|z(OCoLC)931874374 
037    140932:141074|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    N$T|beng|epn|cN$T|dYDXCP|dOCLCQ|dIDEBK|dZCU|dE7B|dNRU
       |dOCLCQ|dOCLCF|dOCLCO|dNLGGC|dOCLCO|dOCLCQ|dOCLCO|dOPELS
       |dZMC|dDKDLA|dOCLCO|dUMI|dOCLCO|dOCLCQ 
049    RIDW 
050  4 TK5105.59|b.X78 2007eb 
072  7 COM|x060040|2bisacsh 
072  7 COM|x043050|2bisacsh 
072  7 COM|x053000|2bisacsh 
082 04 005.8|222 
090    TK5105.59|b.X78 2007eb 
245 00 XSS attacks :|bcross-site scripting exploits and defense /
       |cJeremiah Grossman [and others]. 
246 3  Cross-site scripting exploits and defense 
264  1 Burlington, Mass. :|bSyngress,|c[2007] 
264  4 |c©2007 
300    1 online resource (xiv, 448 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
500    Includes index. 
505 0  Front Cover; XSS Attacks: Cross Site Scripting Exploits 
       and Defense; Copyright Page; Contents; Chapter 1. Cross-
       site Scripting Fundamentals; Chapter 2. The XSS Discovery 
       Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack 
       Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 
       6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 
       8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix 
       A The Owned List; Index. 
520    Cross Site Scripting Attacks starts by defining the terms 
       and laying out the ground work. It assumes that the reader
       is familiar with basic web programming (HTML) and 
       JavaScript. First it discusses the concepts, methodology, 
       and technology that makes XSS a valid concern. It then 
       moves into the various types of XSS attacks, how they are 
       implemented, used, and abused. After XSS is thoroughly 
       explored, the next part provides examples of XSS malware 
       and demonstrates real cases where XSS is a dangerous risk 
       that exposes internet users to remote access, sensitive 
       data theft, and monetary losses. Fin. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 World Wide Web|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh2010118447 
650  0 Web sites|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh2010118448 
650  7 World Wide Web|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/1181329 
650  7 Web sites|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/1173267 
655  4 Electronic books. 
700 1  Grossman, Jeremiah.|0https://id.loc.gov/authorities/names/
       no2010063526 
776 08 |iPrint version:|tXSS attacks.|dBurlington, Mass. : 
       Syngress, ©2007|z9781597491549|z1597491543|w(DLC)  
       2007276594|w(OCoLC)144227881 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=211408|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20160615|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID