All listings for this product
Best-selling in Textbooks
Save on Textbooks
- AU $94.99Trending at AU $106.80
- AU $68.00Trending at AU $81.51
- AU $104.90Trending at AU $118.13
- AU $98.79Trending at AU $108.21
- AU $99.99Trending at AU $107.74
- AU $92.78Trending at AU $106.06
- AU $78.00Trending at AU $87.61
About this product
- DescriptionService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchrous Java and eXtended Markup Language (Ajax) comprise the backbone behind w-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns to the fi eld of Web application security. Yamanner-, Sammy-, and Spaceflash-type worms are exploiting client-side Ajax frameworks, providing new avenues of attack, and compromising confidential information. Portals such as Google, Netflix, Yahoo, and MySpace have witnessed new vulnerabilities recently, and these vulnerabilities can be leveraged by attackers to perform phishing, cross-site scripting (XSS), and cross-site request forgery (CSRF) exploitation. Web 2.0 Security: Defending Ajax, RIA, and SOA covers the new field of Web 2.0 security. Written for security professionals and developers, the book explores Web 2.0 hacking methods and helps enhance next-generation security controls for better application security. Readers will gain kwledge in advanced footprinting and discovery techniques; Web 2.0 scanning and vulnerability detection methods; Ajax and Flash hacking methods; SOAP, REST, and XML-RPC hacking; RSS/Atom feed attacks; fuzzing and code review methodologies and tools; and tool building with Python, Ruby, and . NET. Whether you're a computer security professional, a developer, or an administrator, Web 2.0 Security: Defending Ajax, RIA, and SOA is the only book you will need to prevent new Web 2.0 security threats from harming your network and compromising your data.
- Author BiographyShreeraj Shah, B.E., MSCS, MBA, is a co-founder of Blueinfy and SecurityExposure, companies that provide application security and On Demand Scanning services. Prior to founding Blueinfy, he was founder and board member at Net Square. He also worked with Foundstone (McAfee), Chase Manhattan Bank, and IBM in information security. Shreeraj has played an instrumental role in product development, researching new methodologies, and training designs. He has performed several security consulting assignments in the area of penetration testing, code reviews, web application assessments, security architecture reviews, and managing projects (Products/Services). He is the author of Web 2.0 Security (Cengage Learning, 2007), Hacking Web Services (Thomson Learning, 2006), and Web Hacking: Attacks and Defense (Addison-Wesley, 2002). In addition, he has published several advisories, tools, and whitepapers, and has presented at numerous conferences including RSA, AusCERT, InfosecWorld (Misti), HackInTheBox, Blackhat, OSCON, Bellua, Syscan, ISACA, and OWASP. His articles are regularly published on Securityfocus, InformIT, DevX, O'reilly, and HNS. His work has been quoted on BBC, Dark Reading, and Bank Technology as an expert.
- Author(s)Shreeraj Shah
- PublisherCengage Learning, Inc
- Date of Publication03/01/2008
- FormatMixed media product
- SubjectComputer Communications & Networking
- Place of PublicationHingham
- Country of PublicationUnited States
- ImprintCharles River Media
- Out-of-print date08/03/2017
- Content Noteblack & white illustrations, figures
- Weight812 g
- Width189 mm
- Height234 mm
- Spine22 mm
- Contained items statementContains Paperback and CD-ROM
This item doesn't belong on this page.
Thanks, we'll look into this.