{"product_id":"hacking-exposed-web-20-web-20-security-secrets-and-solutions-9780071494618","title":"Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions","description":"\u003cp\u003e\u003cb\u003ePublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.\u003c\/b\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003e\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eLock down next-generation Web services\u003c\/strong\u003e \u003c\/p\u003e\u003cp\u003e\"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.\" --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook\u003c\/p\u003e\u003cp\u003eProtect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. \u003cem\u003eHacking Exposed Web 2.0\u003c\/em\u003e shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.\u003c\/p\u003e\u003cul\u003e\n\u003cli\u003ePlug security holes in Web 2.0 implementations the proven Hacking Exposed way\u003c\/li\u003e\n\u003cli\u003eLearn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms\u003c\/li\u003e\n\u003cli\u003ePrevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks \u003c\/li\u003e\n\u003cli\u003eCircumvent XXE, directory traversal, and buffer overflow exploits \u003c\/li\u003e\n\u003cli\u003eLearn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls \u003c\/li\u003e\n\u003cli\u003eFix vulnerabilities in Outlook Express and Acrobat Reader add-ons\u003c\/li\u003e\n\u003cli\u003eUse input validators and XML classes to reinforce ASP and .NET security \u003c\/li\u003e\n\u003cli\u003eEliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications\u003c\/li\u003e\n\u003cli\u003eMitigate ActiveX security exposures using SiteLock, code signing, and secure controls\u003c\/li\u003e\n\u003cli\u003eFind and fix Adobe Flash vulnerabilities and DNS rebinding attacks \u003cp\u003e\u003c\/p\u003e\n\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\u003cbr\u003e\u003cbr\u003e\u003cb\u003eAuthor:\u003c\/b\u003e Rich Cannings,Himanshu Dwivedi,Zane Lackey\u003cbr\u003e\u003cb\u003ePublisher:\u003c\/b\u003e McGraw-Hill Education\u003cbr\u003e\u003cb\u003ePublished:\u003c\/b\u003e 01\/07\/2008\u003cbr\u003e\u003cb\u003ePages:\u003c\/b\u003e 258\u003cbr\u003e\u003cb\u003eBinding Type:\u003c\/b\u003e Paperback\u003cbr\u003e\u003cb\u003eWeight:\u003c\/b\u003e 1.04lbs\u003cbr\u003e\u003cb\u003eSize:\u003c\/b\u003e 9.06h x 7.36w x 0.60d\u003cbr\u003e\u003cb\u003eISBN:\u003c\/b\u003e 9780071494618\u003cbr\u003e\u003cp\u003e\u003cb\u003eAbout the Author\u003c\/b\u003e\u003cbr\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eRich Cannings\u003c\/strong\u003e is a senior information security engineer at Google. \u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eHimanshu Dwivedi\u003c\/strong\u003e is a founding partner of iSEC Partners, an information security organization, and the author of several security books. \u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eZane Lackey\u003c\/strong\u003e is a senior security consultant with iSEC Partners.\u003c\/p\u003e\u003cbr\u003e\u003cp\u003e\u003ci\u003eThis title is not returnable\u003c\/i\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"McGraw-Hill Education","offers":[{"title":"Paperback","offer_id":44812551454835,"sku":"9780071494618","price":71.95,"currency_code":"EUR","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0555\/9255\/0515\/files\/img_b4475582-d5cd-41ea-8ea8-0b6cf3825237.jpg?v=1776776799","url":"https:\/\/bookstorenmore.com\/en-de\/products\/hacking-exposed-web-20-web-20-security-secrets-and-solutions-9780071494618","provider":"Bookstore N More","version":"1.0","type":"link"}