ABSTRACT

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive g

chapter 1|26 pages

◾ View of the IT Security World

chapter 2|16 pages

◾ Security of Browser

chapter 3|78 pages

◾ Cross-Site Scripting Attack

chapter 4|18 pages

◾ Cross-Site Request Forgery

chapter 5|16 pages

◾ Clickjacking

chapter 6|16 pages

◾ HTML5 Securities

chapter 7|34 pages

◾ Injection Attacks

chapter 8|14 pages

◾ File Upload Vulnerability

chapter 9|14 pages

◾ Authentication and Session Management

chapter 10|18 pages

◾ Access Control

chapter 11|72 pages

◾ Encryption Algorithms and Random Numbers

chapter 12|18 pages

◾ Web Framework Security

chapter 14|44 pages

◾ PHP Security

chapter 15|16 pages

◾ Web Server Configuration Security

chapter 16|38 pages

◾ Security of Internet Business

chapter 17|20 pages

◾ Security Development Lifecycle

chapter 18|12 pages

◾ Security Operations