skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
XSS attacks : cross-site scripting exploits and defense Preview this item
ClosePreview this item
Checking...

XSS attacks : cross-site scripting exploits and defense

Author: Jeremiah Grossman
Publisher: Burlington, Mass. : Syngress, ©2007.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"Web applications have become the most effective and exploited route for system compromise. Cross-site scripting (XSS) is a Web-based attack vector that can be used to steal sensitive information, hijack user sessions, and compromise browser and system integrity. The authors of this book are the undisputed industry-leading authorities on this topic. In these pages and on the companion Web site, you will find  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Jeremiah Grossman
ISBN: 9781597491549 1597491543
OCLC Number: 144227881
Notes: Includes index.
Description: xiv, 448 pages : illustrations ; 24 cm
Contents: Cross-site scripting fundamentals --
The XSS discovery toolkit --
XSS theory --
XSS attack methods --
Advanced XSS attack vectors --
XSS exploited --
Exploit frameworks --
XSS worms --
Preventing XSS attacks.
Other Titles: Cross-site scripting attacks
Responsibility: Jeremiah Grossman [and others].
More information:

Abstract:

Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (1)

View most popular tags as: tag list | tag cloud

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity<\/h3>
<http:\/\/www.worldcat.org\/oclc\/144227881<\/a>> # XSS attacks : cross-site scripting exploits and defense<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0library:oclcnum<\/a> \"144227881<\/span>\" ;\u00A0\u00A0\u00A0library:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/mau<\/a>> ;\u00A0\u00A0\u00A0library:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Place\/burlington_mass<\/a>> ; # Burlington, Mass.<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1181329<\/a>> ; # World Wide Web--Security measures<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/datasakerhet<\/a>> ; # Datas\u00E4kerhet<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1173267<\/a>> ; # Web sites--Security measures<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/internet<\/a>> ; # Internet<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/web_securite_mesures<\/a>> ; # Web--S\u00E9curit\u00E9--Mesures<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/sites_web_securite_mesures<\/a>> ; # Sites Web--S\u00E9curit\u00E9--Mesures<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2010118447<\/a>> ; # World Wide Web--Security measures<\/span>\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2010118448<\/a>> ; # Web sites--Security measures<\/span>\u00A0\u00A0\u00A0schema:alternateName<\/a> \"Cross-site scripting attacks<\/span>\" ;\u00A0\u00A0\u00A0schema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0schema:contributor<\/a> <http:\/\/viaf.org\/viaf\/273342564<\/a>> ; # Jeremiah Grossman<\/span>\u00A0\u00A0\u00A0schema:copyrightYear<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0schema:datePublished<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0schema:description<\/a> \"Cross-site scripting fundamentals -- The XSS discovery toolkit -- XSS theory -- XSS attack methods -- Advanced XSS attack vectors -- XSS exploited -- Exploit frameworks -- XSS worms -- Preventing XSS attacks.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0schema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/479540501<\/a>> ;\u00A0\u00A0\u00A0schema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0schema:name<\/a> \"XSS attacks : cross-site scripting exploits and defense<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0schema:productID<\/a> \"144227881<\/span>\" ;\u00A0\u00A0\u00A0schema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881#PublicationEvent\/burlington_mass_syngress_2007<\/a>> ;\u00A0\u00A0\u00A0schema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Agent\/syngress<\/a>> ; # Syngress<\/span>\u00A0\u00A0\u00A0schema:reviews<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881#Review\/-650913346<\/a>> ;\u00A0\u00A0\u00A0schema:url<\/a> <http:\/\/bvbr.bib-bvb.de:8991\/F?func=service&doc_library=BVB01&doc_number=017596118&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA<\/a>> ;\u00A0\u00A0\u00A0schema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781597491549<\/a>> ;\u00A0\u00A0\u00A0wdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881<\/a>> ;\u00A0\u00A0\u00A0\u00A0.<\/div>

Related Entities<\/h3>
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Agent\/syngress<\/a>> # Syngress<\/span>\u00A0\u00A0\u00A0\u00A0a bgn:Agent<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Syngress<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Place\/burlington_mass<\/a>> # Burlington, Mass.<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Place<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Burlington, Mass.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/datasakerhet<\/a>> # Datas\u00E4kerhet<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Datas\u00E4kerhet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/internet<\/a>> # Internet<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Internet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/sites_web_securite_mesures<\/a>> # Sites Web--S\u00E9curit\u00E9--Mesures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Sites Web--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Topic\/web_securite_mesures<\/a>> # Web--S\u00E9curit\u00E9--Mesures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Web--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2010118447<\/a>> # World Wide Web--Security measures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"World Wide Web--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2010118448<\/a>> # Web sites--Security measures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Web sites--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/id.loc.gov\/vocabulary\/countries\/mau<\/a>>\u00A0\u00A0\u00A0\u00A0a schema:Place<\/a> ;\u00A0\u00A0\u00A0dcterms:identifier<\/a> \"mau<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/id.worldcat.org\/fast\/1173267<\/a>> # Web sites--Security measures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"Web sites--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/id.worldcat.org\/fast\/1181329<\/a>> # World Wide Web--Security measures<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Intangible<\/a> ;\u00A0\u00A0\u00A0schema:name<\/a> \"World Wide Web--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/viaf.org\/viaf\/273342564<\/a>> # Jeremiah Grossman<\/span>\u00A0\u00A0\u00A0\u00A0a schema:Person<\/a> ;\u00A0\u00A0\u00A0schema:familyName<\/a> \"Grossman<\/span>\" ;\u00A0\u00A0\u00A0schema:givenName<\/a> \"Jeremiah<\/span>\" ;\u00A0\u00A0\u00A0schema:name<\/a> \"Jeremiah Grossman<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/worldcat.org\/isbn\/9781597491549<\/a>>\u00A0\u00A0\u00A0\u00A0a schema:ProductModel<\/a> ;\u00A0\u00A0\u00A0schema:isbn<\/a> \"1597491543<\/span>\" ;\u00A0\u00A0\u00A0schema:isbn<\/a> \"9781597491549<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881<\/a>>\u00A0\u00A0\u00A0\u00A0a genont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0schema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/144227881<\/a>> ; # XSS attacks : cross-site scripting exploits and defense<\/span>\u00A0\u00A0\u00A0schema:dateModified<\/a> \"2018-11-07<\/span>\" ;\u00A0\u00A0\u00A0void:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881#PublicationEvent\/burlington_mass_syngress_2007<\/a>>\u00A0\u00A0\u00A0\u00A0a schema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0schema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Place\/burlington_mass<\/a>> ; # Burlington, Mass.<\/span>\u00A0\u00A0\u00A0schema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/479540501#Agent\/syngress<\/a>> ; # Syngress<\/span>\u00A0\u00A0\u00A0\u00A0.<\/div>
<http:\/\/www.worldcat.org\/title\/-\/oclc\/144227881#Review\/-650913346<\/a>>\u00A0\u00A0\u00A0\u00A0a schema:Review<\/a> ;\u00A0\u00A0\u00A0schema:itemReviewed<\/a> <http:\/\/www.worldcat.org\/oclc\/144227881<\/a>> ; # XSS attacks : cross-site scripting exploits and defense<\/span>\u00A0\u00A0\u00A0schema:reviewBody<\/a> \"\"Web applications have become the most effective and exploited route for system compromise. Cross-site scripting (XSS) is a Web-based attack vector that can be used to steal sensitive information, hijack user sessions, and compromise browser and system integrity. The authors of this book are the undisputed industry-leading authorities on this topic. In these pages and on the companion Web site, you will find bleeding-edge research along with code listings and exploits that can not be found anywhere else.\"--book jacket.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.<\/div>

Content-negotiable representations<\/p>