From buffer overflows to SQL injection, hackers have many techniques at their disposal to attack Web applications, and new methods constantly emerge. Web applications attacks
Requires Free Membership to View
In this Web application attack security guide, learn how Web application attacks occur, identify common and obscure Web application attacks, including buffer overflows, SQL injection, cross-site scripting and distributed denial-of-service (DDoS) attacks, and provide Web application security tools and tactics to protect against them.
WEB APPLICATION ATTACK SECURITY
Introduction: Web application security
This Web application attacks guide explains how Web application attacks occur, identifies Web application attack types, and provides Web application security tools and tactics to protect against them.
How to stop buffer-overflow attacks
Learn how to stop buffer-overflow attacks from infiltrating your systems and learn how to find buffer-overflow flaws and vulnerabilities with protection and defense methods and best practices.
Prevent cross-site scripting hacks
Learn how to prevent cross-site scripting (XSS) attacks, how to avoid a hack, and how to fix vulnerabilities and issues with cross-site scripting prevention tools, system and application testing and several other defense and prevention methods and mechanisms.
Stopping SQL injection hack attacks
You will learn methods, tools and best practices for preventing, avoiding and stopping SQL injection hack attacks.
Distributed denial-of-service protection
Learn what a distributed denial-of service (DDoS) attack is, and learn how to stop and prevent DDoS attacks by using intrusion prevention technologies and products.
This was first published in January 2010
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation