Feature

Web Application Attacks Learning Guide

From buffer-overflows to SQL injection, hackers have various techniques at their disposal to attack Web applications. This guide explains how Web application attacks occur, identifies common and obscure Web application attacks, and provides Web application security tools and tactics to protect against them. As a bonus, this learning guide is also available as a PDF download.

TABLE OF CONTENTS
   Introduction to Web application attacks
   Buffer-overflow attacks
   Cross-site scripting attacks
   SQL injection attacks
   Denial-of-service attacks
   Other application attacks
   Web application security strategies
   More security learning resources
   Security IT Downloads

  Introduction to Web application attacks  Return to Table of Contents

  Buffer-overflow attacks  Return to Table of Contents
  Cross-site scripting  Return to Table of Contents

  SQL Injection attacks  Return to Table of Contents

  Denial-of-service  Return to Table of Contents
  Other application attacks  Return to Table of Contents

  Web application security strategies  Return to Table of Contents

More security learning resources
SECURITY SCHOOL LEARNING GUIDES CHECKLISTS GLOSSARY ASK THE EXPERTS

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in May 2006

 

COMMENTS powered by Disqus  //  Commenting policy