Difference between revisions of "Book:Web Application Security: A Comprehensive Overview"

From LIMSWiki
Jump to navigationJump to search
(Updated as needed.)
 
(5 intermediate revisions by the same user not shown)
Line 10: Line 10:


==''Web Application Security: A Comprehensive Overview''==
==''Web Application Security: A Comprehensive Overview''==
This volume provides a comprehensive overview of "common web application security issues and methods how to prevent them." The content originates from the associated Wikibook, found [[wikibooks::Web Application Security Guide|here]], and is made available under the [https://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 Unported] license. The original was cut into numerous short chapters and also published in a one-page print-friendly format. The latter is the version used here. A content listing is included for your convenience.
This volume provides a comprehensive overview of "common web application security issues and methods how to prevent them." The content originates from the associated Wikibook, found [[wikibooks::Web Application Security Guide|here]], and is made available under the [https://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 Unported] license. The associated Wikipedia article on the topic is also appended to give additional introductory context. (A [[LII:Web Application Security Guide/Print version|print-friendly version]] also exists.)


{|  
:[[Web application security|Introducing web application security]]
| STYLE="vertical-align:top;"|
:[[LII:Web Application Security Guide/Intro|Opening comments]]
{| border="0" cellpadding="5" cellspacing="0" width="100%"
:[[LII:Web Application Security Guide/Checklist|Checklist]]
|-
:[[LII:Web Application Security Guide/Miscellaneous points|Miscellaneous points]]
  | 1. Intro and checklist<br />2. Miscellaneous points<br />3. File inclusion and disclosure<br />4. File upload vulnerabilities<br />5. SQL injection<br />6. Cross-site scripting (XSS)<br />7. XML and internal data escaping<br />8. XML, JSON and general API security<br />9. (Un)trusted input<br />10. Cross-site request forgery (CSRF)<br />11. Clickjacking<br />12. Insecure data transfer
:[[LII:Web Application Security Guide/File inclusion and disclosure|File inclusion and disclosure]]
  | 13. Session fixation<br />14. Session stealing<br />15. Truncation attacks, trimming attacks<br />16. Password security<br />17. Comparison issues<br />18. PHP-specific issues<br />19. Prefetching and Spiders<br />20. Special files<br />21. SSL, TLS and HTTPS basics<br />22. Further reading<br />23. Authors
:[[LII:Web Application Security Guide/File upload vulnerabilities|File upload vulnerabilities]]
|-
:[[LII:Web Application Security Guide/SQL injection|SQL injection]]
|}
:[[LII:Web Application Security Guide/Cross-site scripting (XSS)|Cross-site scripting (XSS)]]
|}
:[[LII:Web Application Security Guide/XML and internal data escaping|XML and internal data escaping]]
[[LII:Web Application Security Guide/Print version|Web Application Security: A Comprehensive Overview]]
:[[LII:Web Application Security Guide/XML, JSON and general API security|XML, JSON and general API security]]
:[[LII:Web Application Security Guide/(Un)trusted input|(Un)trusted input]]
:[[LII:Web Application Security Guide/Cross-site request forgery (CSRF)|Cross-site request forgery (CSRF)]]
:[[LII:Web Application Security Guide/Clickjacking|Clickjacking]]
:[[LII:Web Application Security Guide/Insecure data transfer|Insecure data transfer]]
:[[LII:Web Application Security Guide/Session fixation|Session fixation]]
:[[LII:Web Application Security Guide/Session stealing|Session stealing]]
:[[LII:Web Application Security Guide/Truncation attacks, trimming attacks|Truncation attacks, trimming attacks]]
:[[LII:Web Application Security Guide/Password security|Password security]]
:[[LII:Web Application Security Guide/Comparison issues|Comparison issues]]
:[[LII:Web Application Security Guide/PHP-specific issues|PHP-specific issues]]
:[[LII:Web Application Security Guide/Prefetching and spiders|Prefetching and spiders]]
:[[LII:Web Application Security Guide/Special files|Special files]]
:[[LII:Web Application Security Guide/SSL, TLS and HTTPS basics|SSL, TLS and HTTPS basics]]
:[[LII:Web Application Security Guide/Further reading|Further reading]]
:[[LII:Web Application Security Guide/Authors|Authors]]


<!--Place all category tags here-->
<!--Place all category tags here-->
:[[Category:LIMSwiki books on software]]
:[[Category:LIMSwiki books on software]]

Latest revision as of 21:48, 10 August 2016

Web Application Security
A Comprehensive Overview
File:OWASP Logo.png
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Web Application Security: A Comprehensive Overview

This volume provides a comprehensive overview of "common web application security issues and methods how to prevent them." The content originates from the associated Wikibook, found here, and is made available under the Creative Commons Attribution-ShareAlike 3.0 Unported license. The associated Wikipedia article on the topic is also appended to give additional introductory context. (A print-friendly version also exists.)

Introducing web application security
Opening comments
Checklist
Miscellaneous points
File inclusion and disclosure
File upload vulnerabilities
SQL injection
Cross-site scripting (XSS)
XML and internal data escaping
XML, JSON and general API security
(Un)trusted input
Cross-site request forgery (CSRF)
Clickjacking
Insecure data transfer
Session fixation
Session stealing
Truncation attacks, trimming attacks
Password security
Comparison issues
PHP-specific issues
Prefetching and spiders
Special files
SSL, TLS and HTTPS basics
Further reading
Authors