Web application attacks security guide: Preventing attacks and flaws

This Web application attacks guide explains how Web application attacks occur, identifies Web application attack types, and provides Web application security tools and tactics to protect against them.

This Content Component encountered an error

From buffer overflows to SQL injection, hackers have many techniques at their disposal to attack Web applications, and new methods constantly emerge. Web applications attacks can cost organizations time and money and lead to expensive and embarrassing data security breaches, making thorough defense strategies and defense mechanisms imperative for every organization.

In this Web application attack security guide, learn how Web application attacks occur, identify common and obscure Web application attacks, including buffer overflows, SQL injection, cross-site scripting and distributed denial-of-service (DDoS) attacks, and provide Web application security tools and tactics to protect against them.

WEB APPLICATION ATTACK SECURITY

Introduction: Web application security
This Web application attacks guide explains how Web application attacks occur, identifies Web application attack types, and provides Web application security tools and tactics to protect against them.

How to stop buffer-overflow attacks
Learn how to stop buffer-overflow attacks from infiltrating your systems and learn how to find buffer-overflow flaws and vulnerabilities with protection and defense methods and best practices.

Prevent cross-site scripting hacks
Learn how to prevent cross-site scripting (XSS) attacks, how to avoid a hack, and how to fix vulnerabilities and issues with cross-site scripting prevention tools, system and application testing and several other defense and prevention methods and mechanisms.

Stopping SQL injection hack attacks
You will learn methods, tools and best practices for preventing, avoiding and stopping SQL injection hack attacks.

Distributed denial-of-service protection
Learn what a distributed denial-of service (DDoS) attack is, and learn how to stop and prevent DDoS attacks by using intrusion prevention technologies and products.
 

This was first published in January 2010

Dig deeper on Web Application Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close