000722674 000__ 03371cam\a2200529Ii\4500 000722674 001__ 722674 000722674 005__ 20230306140235.0 000722674 006__ m\\\\\o\\d\\\\\\\\ 000722674 007__ cr\un\nnnunnun 000722674 008__ 141201s2014\\\\sz\\\\\\ob\\\\000\0\eng\d 000722674 019__ $$a899249134 000722674 020__ $$a9783319122267$$qelectronic book 000722674 020__ $$a3319122266$$qelectronic book 000722674 020__ $$z9783319122250 000722674 0247_ $$a10.1007/978-3-319-12226-7$$2doi 000722674 035__ $$aSP(OCoLC)ocn897115767 000722674 035__ $$aSP(OCoLC)897115767$$z(OCoLC)899249134 000722674 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dOCLCO$$dOCLCQ$$dE7B$$dN$T$$dCOO$$dUPM$$dCUS$$dCDX$$dGW5XE$$dOCLCF 000722674 049__ $$aISEA 000722674 050_4 $$aTK5105.59$$b.R93 2014eb 000722674 08204 $$a005.8$$223 000722674 1001_ $$aDe Ryck, Philippe,$$eauthor. 000722674 24510 $$aPrimer on client-side web security$$h[electronic resource] /$$cPhilippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns. 000722674 264_1 $$aCham :$$bSpringer,$$c[2014] 000722674 264_4 $$c©2014 000722674 300__ $$a1 online resource. 000722674 336__ $$atext$$btxt$$2rdacontent 000722674 337__ $$acomputer$$bc$$2rdamedia 000722674 338__ $$aonline resource$$bcr$$2rdacarrier 000722674 347__ $$atext file$$bPDF$$2rda 000722674 4901_ $$aSpringerBriefs in computer science 000722674 504__ $$aIncludes bibliographical references. 000722674 5050_ $$aThe Relevance of Client-side Web Security -- Traditional Building Blocks of the Web -- The Browser as a Platform -- How Attackers Threaten the Web -- Attacks on the Network -- Attacks on the Browser's Requests -- Attacks on the User's Session -- Attacks on the Client-Side Context -- Attacks on the Client Device -- Improving Client-side Web Security. 000722674 506__ $$aAccess limited to authorized users. 000722674 520__ $$aThis volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem are identified, and the set of capabilities an attacker may have are enumerated. In the second part, an overview of the web security vulnerability landscape is constructed. Included are selections of the most representative attack techniques reported in great detail. In addition to descriptions of the most common mitigation techniques, this primer also surveys the research and standardization activities related to each of the attack techniques, and gives insights into the prevalence of those very attacks. Moreover, the book provides practitioners a set of best practices to gradually improve the security of their web-enabled services. Primer on Client-Side Web Security expresses insights into the future of web application security. It points out the challenges of securing the Web platform, opportunities for future research, and trends toward improving Web security. 000722674 650_0 $$aComputer networks$$xSecurity measures. 000722674 650_0 $$aClient/server computing. 000722674 650_0 $$aWorld Wide Web. 000722674 7001_ $$aDesmet, Lieven,$$eauthor. 000722674 7001_ $$aPiessens, Frank,$$eauthor. 000722674 7001_ $$aJohns, Martin,$$eauthor. 000722674 77608 $$iPrinte version:$$z9783319122250 000722674 830_0 $$aSpringerBriefs in computer science. 000722674 852__ $$bebk 000722674 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-12226-7$$zOnline Access$$91397441.1 000722674 909CO $$ooai:library.usi.edu:722674$$pGLOBAL_SET 000722674 980__ $$aEBOOK 000722674 980__ $$aBIB 000722674 982__ $$aEbook 000722674 983__ $$aOnline 000722674 994__ $$a92$$bISE