|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-12226-7 |
003 |
DE-He213 |
005 |
20220117023952.0 |
007 |
cr nn 008mamaa |
008 |
141125s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319122267
|9 978-3-319-12226-7
|
024 |
7 |
|
|a 10.1007/978-3-319-12226-7
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a De Ryck, Philippe.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Primer on Client-Side Web Security
|h [electronic resource] /
|c by Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a X, 111 p. 13 illus., 12 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a The Relevance of Client-side Web Security -- Traditional Building Blocks of the Web -- The Browser as a Platform -- How Attackers Threaten the Web -- Attacks on the Network -- Attacks on the Browser's Requests -- Attacks on the User's Session -- Attacks on the Client-Side Context -- Attacks on the Client Device -- Improving Client-side Web Security.
|
520 |
|
|
|a This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem are identified, and the set of capabilities an attacker may have are enumerated. In the second part, an overview of the web security vulnerability landscape is constructed. Included are selections of the most representative attack techniques reported in great detail. In addition to descriptions of the most common mitigation techniques, this primer also surveys the research and standardization activities related to each of the attack techniques, and gives insights into the prevalence of those very attacks. Moreover, the book provides practitioners a set of best practices to gradually improve the security of their web-enabled services. Primer on Client-Side Web Security expresses insights into the future of web application security. It points out the challenges of securing the Web platform, opportunities for future research, and trends toward improving Web security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Desmet, Lieven.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Piessens, Frank.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Johns, Martin.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319122274
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319122250
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-12226-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|