Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Understanding the Risks Associated with Mobile Code • Chapter 3 121
Summary
Mobile code is a great thing for adding powerful features and content,
but it has its drawbacks. E-mail goes directly to a specific address, so
with these methods, a hacker can target a single organization or even a
single person.The types of mobile code discussed in this chapter all have
had some thought put into making them secure, but the technology is
so complex that security holes have been found in every one. Even
greater risks are introduced when two or more types of mobile code are
allowed to interact with each other. Individually, they might be fairly
safe, but when w ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312