It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03225cam a2200385 a 4500
001 2011039636
003 DLC
005 20120831082447.0
008 111024s2012 caua b 001 0 eng
010 $a 2011039636
020 $a9781593273880 (pbk.)
020 $a1593273886 (pbk.)
040 $aDLC$cDLC$dDLC
042 $apcc
050 00 $aTK5105.59$b.Z354 2012
082 00 $a005.8$223
084 $aCOM060040$aCOM015000$aCOM043000$aCOM043040$aCOM053000$aCOM083000$aCOM043050$aCOM060160$aCOM060010$2bisacsh
100 1 $aZalewski, Michal.
245 14 $aThe tangled Web :$ba guide to securing modern Web applications /$cMichal Zalewski.
260 $aSan Francisco :$bNo Starch Press,$cc2012.
300 $axix, 299 p. :$bill. ;$c24 cm.
520 $a"'Thorough and comprehensive coverage from one of the foremost experts in browser security.' --Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, CSP, and CORS Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"--$cProvided by publisher.
504 $aIncludes bibliographical references (p. 267-282) and index.
650 0 $aComputer networks$xSecurity measures.
650 0 $aBrowsers (Computer programs)
650 0 $aComputer security.
650 7 $aCOMPUTERS / Internet / Security.$2bisacsh
650 7 $aCOMPUTERS / Security / Viruses.$2bisacsh
650 7 $aCOMPUTERS / Networking / General.$2bisacsh
650 7 $aCOMPUTERS / Networking / Network Protocols.$2bisacsh
650 7 $aCOMPUTERS / Security / General.$2bisacsh
650 7 $aCOMPUTERS / Security / Cryptography.$2bisacsh
650 7 $aCOMPUTERS / Networking / Security.$2bisacsh
650 7 $aCOMPUTERS / Web / Web Programming.$2bisacsh
650 7 $aCOMPUTERS / Web / Browsers.$2bisacsh