O'Reilly logo

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Justin Schuh, John McDonald, Mark Dowd

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18. Web Technologies

“Your training starts now. When I’m through with you, you’ll be a member of the elite agency that’s been thanklessly defending this country since the second American Revolution—the invisible one.”

Hunter, The Venture Bros.

Introduction

The Web has undergone major changes in the post dot-com era. Static content and simple page-structured front ends are being replaced with Web-based pipelines and rich Web applications. These new technologies are often collectively referred to as “Web 2.0.” At its most basic level, the Web 2.0 approach doesn’t add anything new to Web application security. However, it incorporates Web technologies at such a fundamental level that it’s often more prone to standard Web vulnerabilities. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required