|
Showing 1 - 2 of
2 matches in All Departments
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are
identified, and detection and prevention strategies are considered.
Wherever possible, real-world examples are used to illustrate the
threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely
new threats to their enterprise
* Includes real-world examples of system intrusions and compromised
data
* Provides techniques and strategies to detect, prevent, and
recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social
Engineering, Botnets, and Convergence
A cross site scripting attack is a very specific type of attack on
a web application. It is used by hackers to mimic real sites and
fool people into providing personal data.
Cross Site Scripting Attacks starts by defining the terms and
laying out the ground work. It assumes that the reader is familiar
with basic web programming (HTML) and JavaScript. First it
discusses the concepts, methodology, and technology that makes XSS
a valid concern. It then moves into the various types of XSS
attacks, how they are implemented, used, and abused. After XSS is
thoroughly explored, the next part provides examples of XSS malware
and demonstrates real cases where XSS is a dangerous risk that
exposes internet users to remote access, sensitive data theft, and
monetary losses. Finally, the book closes by examining the ways
developers can avoid XSS vulnerabilities in their web applications,
and how users can avoid becoming a victim. The audience is web
developers, security practitioners, and managers.
* XSS Vulnerabilities exist in 8 out of 10 Web sites
* The authors of this book are the undisputed industry leading
authorities
* Contains independent, bleeding edge research, code listings and
exploits that can not be found anywhere else
|
|