Web 2.0 Security - Defending AJAX, RIA, and SOA

Course

Distance

£ 28 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

Web 2.0 Security: Defending Ajax, RIA, and SOA covers the new field of Web 2.0 security. Written for security professionals and developers, the book explores Web 2.0 hacking methods. Helping enhance next-generation security controls for better application security.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
Web 2.0 Security: Defending Ajax, RIA, and SOA covers the new field of Web 2.0 security. Written for security professionals and developers, the book explores Web 2.0 hacking methods. Helping enhance next-generation security controls for better application security.

Program

Web 2.0 Security: Defending Ajax, RIA, and SOA covers the new field of Web 2.0 security. Written for security professionals and developers, the book explores Web 2.0 hacking methods. Helping enhance next-generation security controls for better application security.








Readers will gain knowledge in advanced footprinting and discovery techniques, including:

  • Web 2.0 scanning and vulnerability detection methods
  • Ajax and Flash hacking methods.
  • SOAP, REST, and XML-RPC hacking.
  • RSS/Atom feed attacks.
  • Fuzzing and code review methodologies as well as tools.
  • Tool building with Python, Ruby, and .NET.
Key Features & Benefits:
  • Covers new Web 2.0 hacking methodologies through hands-on examples and case studies helping the reader understand the key information.
  • Explains Ajax attack vectors and defence.
  • Provides instruction on reverse-engineering for Flash and .NET based applications and hacking methodologies for Simple Object Access Protocol (SOAP), XML-RPC and REST-based applications.
  • Presents advanced Web 2.0 hacking methods including scanning, footprinting and discovery.
  • Covers dynamic Document Object Model (DOM) event management with Ruby.
  • Explains Web 2.0 security assessment and defence tools as well as their usage.
  • Contains a companion CD-ROM with tools, Flash-based demos and an abundance of samples, code, and images.



Author: Shreeraj Shah
Publisher: Delmar Learning
ISBN 10: 1584505508

ISBN 13: 9781584505501
Pages: 384
Format: Soft Cover
Published Date: 3 January 2008
Availability: In Stock

Order this guide to Web 2.0 security today, understand how to protect your organisation from the new wave of security threats that are associated with RSS, Ruby, XML, Atom, wikis, blogs, and more using this book - order today!

Web 2.0 Security - Defending AJAX, RIA, and SOA

£ 28 + VAT