Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
About the Author
Acknowledgements
Introduction
Book Overview and Key Learning Points
Book Audience
How This Book is Organized
Where to Go From Here
Chapter 1. HTML5
The New Document Object Model (DOM)
Cross-Origin Resource Sharing (CORS)
WebSockets
Web Storage
Web Workers
Flotsam & Jetsam
Summary
Chapter 2. HTML Injection & Cross-Site Scripting (XSS)
Understanding HTML Injection
Employing Countermeasures
Summary
Chapter 3. Cross-Site Request Forgery (CSRF)
Understanding Cross-Site Request Forgery
Employing Countermeasures
Summary
Chapter 4. SQL Injection & Data Store Manipulation
Understanding SQL Injection
Hacking Tangents: Mathematical and Grammatical
Breaking SQL Statements
Vivisecting the Database
Employing Countermeasures
Summary
Chapter 5. Breaking Authentication Schemes
Understanding Authentication Attacks
Employing Countermeasures
Summary
Chapter 6. Abusing Design Deficiencies
Understanding Logic & Design Attacks
Employing Countermeasures
Summary
Chapter 7. Leveraging Platform Weaknesses
Understanding the Attacks
Employing Countermeasures
Summary
Chapter 8. Browser & Privacy Attacks
Understanding Malware and Browser Attacks
Employing Countermeasures
Summary
Index
← Prev
Back
Next →
← Prev
Back
Next →