Related Books
Language: en
Pages: 291
Pages: 291
Type: BOOK - Published: 2010-12-10 - Publisher: Elsevier
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed h
Language: en
Pages:
Pages:
Type: BOOK - Published: 2011 - Publisher:
Language: en
Pages: 770
Pages: 770
Type: BOOK - Published: 2011-03-16 - Publisher: John Wiley & Sons
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-w
Language: en
Pages: 137
Pages: 137
Type: BOOK - Published: 2015-09-04 - Publisher: MIT Press
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brun
Language: en
Pages: 298
Pages: 298
Type: BOOK - Published: 2012-08-29 - Publisher: Newnes
HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication