LEADER 00000cam a2200625Ia 4500 001 ocn182761515 003 OCoLC 005 20160527040933.6 006 m o d 007 cr cnu---unuuu 008 071204s2007 maua o 001 0 eng d 019 162131589|a182732367|a488134027|a507007882|a647685788 |a856957781|a931874374 020 9780080553405|q(electronic book) 020 0080553400|q(electronic book) 020 9781597491549 020 1597491543 035 (OCoLC)182761515|z(OCoLC)162131589|z(OCoLC)182732367 |z(OCoLC)488134027|z(OCoLC)507007882|z(OCoLC)647685788 |z(OCoLC)856957781|z(OCoLC)931874374 037 140932:141074|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 N$T|beng|epn|cN$T|dYDXCP|dOCLCQ|dIDEBK|dZCU|dE7B|dNRU |dOCLCQ|dOCLCF|dOCLCO|dNLGGC|dOCLCO|dOCLCQ|dOCLCO|dOPELS |dZMC|dDKDLA|dOCLCO|dUMI|dOCLCO|dOCLCQ 049 RIDW 050 4 TK5105.59|b.X78 2007eb 072 7 COM|x060040|2bisacsh 072 7 COM|x043050|2bisacsh 072 7 COM|x053000|2bisacsh 082 04 005.8|222 090 TK5105.59|b.X78 2007eb 245 00 XSS attacks :|bcross-site scripting exploits and defense / |cJeremiah Grossman [and others]. 246 3 Cross-site scripting exploits and defense 264 1 Burlington, Mass. :|bSyngress,|c[2007] 264 4 |c©2007 300 1 online resource (xiv, 448 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 500 Includes index. 505 0 Front Cover; XSS Attacks: Cross Site Scripting Exploits and Defense; Copyright Page; Contents; Chapter 1. Cross- site Scripting Fundamentals; Chapter 2. The XSS Discovery Toolkit; Chapter 3. XSS Theory; Chapter 4. XSS Attack Methods; Chapter 5. Advanced XSS Attack Vectors; Chapter 6. XSS Exploited; Chapter 7. Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List; Index. 520 Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Fin. 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 World Wide Web|xSecurity measures.|0https://id.loc.gov/ authorities/subjects/sh2010118447 650 0 Web sites|xSecurity measures.|0https://id.loc.gov/ authorities/subjects/sh2010118448 650 7 World Wide Web|xSecurity measures.|2fast|0https:// id.worldcat.org/fast/1181329 650 7 Web sites|xSecurity measures.|2fast|0https:// id.worldcat.org/fast/1173267 655 4 Electronic books. 700 1 Grossman, Jeremiah.|0https://id.loc.gov/authorities/names/ no2010063526 776 08 |iPrint version:|tXSS attacks.|dBurlington, Mass. : Syngress, ©2007|z9781597491549|z1597491543|w(DLC) 2007276594|w(OCoLC)144227881 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=211408|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID