Skip to Content
Internet Security: How to Defend Against Attackers on the Web, 2nd Edition
book

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

by Mike Harwood
July 2015
Intermediate to advanced
438 pages
14h 13m
English
Jones & Bartlett Learning
Content preview from Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

CHAPTER 8

Mitigating Web Application Vulnerabilities

WEB APPLICATIONS ARE AN ESSENTIAL PART of the online experience. Every day, companies roll out Web applications to increase the appeal, functionality, and interactivity of their Web sites. These applications can take the form of portals, shopping carts, Web mail, online auctions, forms, discussion groups, and more. For all the good these Web applications introduce, they also bring a host of new vulnerabilities and security threats. Malicious users may invade a Web site through backdoor access of an unsecured Web application, completely circumventing perimeter security measures.

This chapter details the causes of these vulnerabilities and the largest targets for Web applications. In addition, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Davi Ottenheimer, Matthew Wallace
Hacker Techniques, Tools, and Incident Handling

Hacker Techniques, Tools, and Incident Handling

Sean-Philip Oriyano, Michael Gregg

Publisher Resources

ISBN: 9781284090550