Books & Videos

Table of Contents

  1. Chapter 1 Security in the World of Web Applications

    1. Information Security in a Nutshell

    2. A Brief History of the Web

    3. The Evolution of a Threat

    4. Global browser market share, May 2011

  2. Anatomy of the Web

    1. Chapter 2 It Starts with a URL

      1. Uniform Resource Locator Structure
      2. Reserved Characters and Percent Encoding
      3. Common URL Schemes and Their Function
      4. Resolution of Relative URLs
    2. Chapter 3 Hypertext Transfer Protocol

      1. Basic Syntax of HTTP Traffic
      2. HTTP Request Types
      3. Server Response Codes
      4. Keepalive Sessions
      5. Chunked Data Transfers
      6. Caching Behavior
      7. HTTP Cookie Semantics
      8. HTTP Authentication
      9. Protocol-Level Encryption and Client Certificates
    3. Chapter 4 Hypertext Markup Language

      1. Basic Concepts Behind HTML Documents
      2. Understanding HTML Parser Behavior
      3. Entity Encoding
      4. HTTP/HTML Integration Semantics
      5. Hyperlinking and Content Inclusion
    4. Chapter 5 Cascading Style Sheets

      1. Basic CSS Syntax
      2. Parser Resynchronization Risks
      3. Character Encoding
    5. Chapter 6 Browser-Side Scripts

      1. Basic Characteristics of JavaScript
      2. Standard Object Hierarchy
      3. Script Character Encoding
      4. Code Inclusion Modes and Nesting Risks
      5. The Living Dead: Visual Basic
    6. Chapter 7 Non-HTML Document Types

      1. Plaintext Files
      2. Bitmap Images
      3. Audio and Video
      4. XML-Based Documents
      5. A Note on Nonrenderable File Types
    7. Chapter 8 Content Rendering with Browser Plug-ins

      1. Invoking a Plug-in
      2. Document Rendering Helpers
      3. Plug-in-Based Application Frameworks
      4. ActiveX Controls
      5. Living with Other Plug-ins
  3. Browser Security Features

    1. Chapter 9 Content Isolation Logic

      1. Same-Origin Policy for the Document Object Model
      2. Same-Origin Policy for XMLHttpRequest
      3. Same-Origin Policy for Web Storage
      4. Security Policy for Cookies
      5. Plug-in Security Rules
      6. Coping with Ambiguous or Unexpected Origins
      7. Other Uses of Origins
    2. Chapter 10 Origin Inheritance

      1. Origin Inheritance for about:blank
      2. Inheritance for data: URLs
      3. Inheritance for javascript: and vbscript: URLs
      4. A Note on Restricted Pseudo-URLs
    3. Chapter 11 Life Outside Same-Origin Rules

      1. Window and Frame Interactions
      2. Cross-Domain Content Inclusion
      3. Privacy-Related Side Channels
      4. Other SOP Loopholes and Their Uses
    4. Chapter 12 Other Security Boundaries

      1. Navigation to Sensitive Schemes
      2. Access to Internal Networks
      3. Prohibited Ports
      4. Limitations on Third-Party Cookies
    5. Chapter 13 Content Recognition Mechanisms

      1. Document Type Detection Logic
      2. Character Set Handling
    6. Chapter 14 Dealing with Rogue Scripts

      1. Denial-of-Service Attacks
      2. Window-Positioning and Appearance Problems
      3. Timing Attacks on User Interfaces
    7. Chapter 15 Extrinsic Site Privileges

      1. Browser- and Plug-in-Managed Site Permissions
      2. Form-Based Password Managers
      3. Internet Explorer’s Zone Model
  4. A Glimpse of Things to Come

    1. Chapter 16 New and Upcoming Security Features

      1. Security Model Extension Frameworks
      2. Security Model Restriction Frameworks
      3. Other Developments
    2. Chapter 17 Other Browser Mechanisms of Note

      1. URL- and Protocol-Level Proposals
      2. Content-Level Features
      3. I/O Interfaces
  5. Chapter 18 Common Web Vulnerabilities

    1. Vulnerabilities Specific to Web Applications

    2. Problems to Keep in Mind in Web Application Design

    3. Common Problems Unique to Server-Side Code

  1. Appendix Epilogue

  2. Notes

  3. UPDATES