* Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
* Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
* Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
* Circumvent XXE, directory traversal, and buffer overflow exploits
* Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
* Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
* Use input validators and XML classes to reinforce ASP and .NET security
* Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
* Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks
About the Author
Rich Cannings is a senior information security engineer at Google.
Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization, and the author of several security books.
Zane Lackey is a senior security consultant with iSEC Partners
[Você precisa estar registrado e conectado para ver este link.]