Skip to Content
Developer's Guide to Web Application Security
book

Developer's Guide to Web Application Security

by Michael Cross
April 2011
Intermediate to advanced
500 pages
16h 12m
English
Syngress
Content preview from Developer's Guide to Web Application Security
Internet. Once this was accomplished, anyone going to your Web site would be redi-
rected to the other. BO2K also allows plug-ins, developed by third parties, to be
used on the server side, client side, or both. Many third parties have taken up the call
and developed some ingenious, albeit lethal, plug-ins.The plug-in modules allow for
even greater functionality from the server or client.These include:
See the user’s desktop live through a small video stream.
When the user logs on, it sends e-mail with the user’s IP address to a
selected e-mail address.
Encrypt all network traffic from BO2K, so administrators can’t detect it on
their network.
Piggyback ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security for Web Developers

Security for Web Developers

John Paul Mueller
Securing Web Applications

Securing Web Applications

Stephen Gates, Allan Liska

Publisher Resources

ISBN: 9781597490610