LEADER 05316nam 2200649 450 001 9910463684803321 005 20200520144314.0 010 $a1-118-66210-5 035 $a(CKB)2670000000530895 035 $a(EBL)1641459 035 $a(SSID)ssj0001153869 035 $a(PQKBManifestationID)11727952 035 $a(PQKBTitleCode)TC0001153869 035 $a(PQKBWorkID)11154479 035 $a(PQKB)11130589 035 $a(MiAaPQ)EBC1641459 035 $a(CaSebORM)9781118662090 035 $a(Au-PeEL)EBL1641459 035 $a(CaPaEBR)ebr10842312 035 $a(CaONFJC)MIL578595 035 $a(OCoLC)871225516 035 $a(EXLCZ)992670000000530895 100 $a20140313h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe browser hacker's handbook /$fWade Alcorn, Christian Frichot, Michele Orru? 205 $a1st edition 210 1$aIndianapolis, Indiana :$cWiley,$d2014. 210 4$d©2014 215 $a1 online resource (650 p.) 300 $aIncludes index. 311 $a1-118-66209-1 320 $aIncludes bibliographical references and index. 327 $aCopyright; About the Authors; About the Contributing Authors; About the Technical Editor; Credits; Acknowledgments; Contents; Introduction; Chapter 1: Web Browser Security; A Principal Principle; Exploring the Browser; Symbiosis with the Web Application; Same Origin Policy; HTTP Headers; Markup Languages; HTML; XML; Cascading Style Sheets; Scripting; JavaScript; VBScript; Document Object Model; Rendering Engines; WebKit; Trident; Gecko; Presto; Blink; Geolocation; Web Storage; Cross-origin Resource Sharing; HTML5; WebSocket; Web Workers; History Manipulation; WebRTC; Vulnerabilities 327 $aEvolutionary PressuresHTTP Headers; Content Security Policy; Secure Cookie Flag; HttpOnly Cookie Flag; X-Content-Type-Options; Strict-Transport-Security; X-Frame-Options; Reflected XSS Filtering; Sandboxing; Browser Sandboxing; IFrame Sandboxing; Anti-phishing and Anti-malware; Mixed Content; Core Security Problems; Attack Surface; Rate of Change; Silent Updating; Extensions; Plugins; Surrendering Control; TCP Protocol Control; Encrypted Communication; Same Origin Policy; Fallacies; Robustness Principle Fallacy; External Security Perimeter Fallacy; Browser Hacking Methodology; Initiating 327 $aRetainingAttacking; Summary; Questions; Notes; Chapter 2: Initiating Control; Understanding Control Initiation; Control Initiation Techniques; Using Cross-site Scripting Attacks; Reflected Cross-site Scripting; Stored Cross-site Scripting; DOM Cross-site Scripting; Universal Cross-site Scripting; XSS Viruses; Bypassing XSS Controls; Using Compromised Web Applications; Using Advertising Networks; Using Social Engineering Attacks; Phishing Attacks; Baiting; Anti-Phishing Controls; Using Man-in-the-Middle Attacks; Man-in-the-Browser; Wireless Attacks; ARP Spoofing; DNS Poisoning 327 $aExploiting CachingSummary; Questions; Notes; Chapter 3: Retaining Control; Understanding Control Retention; Exploring Communication Techniques; Using XMLHttpRequest Polling; Using Cross-origin Resource Sharing; Using WebSocket Communication; Using Messaging Communication; Using DNS Tunnel Communication; Exploring Persistence Techniques; Using IFrames; Using Full Browser Frame Overlay; Using Browser Events; Using Pop-Under Windows; Using Man-in-the-Browser Attacks; Hijacking AJAX Calls; Hijacking Non-AJAX Requests; Evading Detection; Evasion using Encoding; Base64 Encoding; Whitespace Encoding 327 $aNon-alphanumeric JavaScriptEvasion using Obfuscation; Random Variables and Methods; Mixing Object Notations; Time Delays; Mixing Content from Another Context; Using the callee Property; Evasion using JavaScript Engines Quirks; Summary; Questions; Notes; Chapter 4: Bypassing the Same; Understanding the Same Origin Policy; Understanding the SOP with the DOM; Understanding the SOP with CORS; Understanding the SOP with Plugins; Understanding the SOP with UI Redressing; Understanding the SOP with Browser History; Exploring SOP Bypasses; Bypassing SOP in Java; Bypassing SOP in Adobe Reader 327 $aBypassing SOP in Adobe Flash 330 $aHackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer ""program"" in the world. As the gateway to the Internet, it is part of the storefront to any business that 606 $aComputer hackers$vHandbooks, manuals, etc 608 $aElectronic books. 615 0$aComputer hackers 676 $a005.8 700 $aAlcorn$b Wade$0870702 701 $aFrichot$b Christian$0870703 701 $aOrru?$b Michele$0870704 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463684803321 996 $aThe browser hacker's handbook$91943983 997 $aUNINA LEADER 01504nam2 2200361 i 450 001 UFI0204040 005 20251003044428.0 010 $a8813191588 020 $aIT$b95-9089 100 $a20130827d1995 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aˆ21: Il ‰pubblico impiego$fAlessandro Catelani 205 $a2. ed 210 $aPadova$dCEDAM,1995 215 $aXV, 323 p.$d25 cm. 461 1$1001CFI0076450$12001 $aTrattato di diritto amministrativo$fdiretto dal prof. Giuseppe Santaniello$v21 606 $aImpiego pubblico$2FIR$3CFIC030144$9I 676 $a342.45068$9POTERE ESECUTIVO. FUNZIONARI E DIPENDENTI. ITALIA$v20 676 $a352.63$9Amministrazione del personale. Impiego pubblico$v20 696 $aRapporto di pubblico impiego$aPubblico impiego 699 $aImpiego pubblico$yRapporto di pubblico impiego 699 $aImpiego pubblico$yPubblico impiego 700 1$aCatelani$b, Alessandro$3CFIV096341$4070$0231093 801 3$aIT$bIT-000000$c20130827 850 $aIT-BN0095 $aIT-NA0070 912 $aUFI0204040 950 2$aBiblioteca Centralizzata di Ateneo$cv. 1; 5-8; 10-13; 15.1; 16; 18-19; 21-23$d 01TRA 39 TRADDA$e 0101 0700176695 VMA (00021 2.ed v. 21 (2.ed. - Precedente collocazione: 342.4506 TRA XXI)$fB $h20250320$i20250320 977 $a 01$a BU 996 $aPubblico impiego$9207071 997 $aUNISANNIO LEADER 03621nam 22007215 450 001 996630869903316 005 20250729113307.0 010 $a9783031779541 010 $a3031779541 024 7 $a10.1007/978-3-031-77954-1 035 $a(CKB)36701958800041 035 $a(MiAaPQ)EBC31807815 035 $a(Au-PeEL)EBL31807815 035 $a(DE-He213)978-3-031-77954-1 035 $a(OCoLC)1477222006 035 $a(EXLCZ)9936701958800041 100 $a20241129d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCognitive Computing - ICCC 2024 $e8th International Conference, Held as Part of the Services Conference Federation, SCF 2024, Bangkok, Thailand, November 16?19, 2024, Proceedings /$fedited by Ruifeng Xu, Huan Chen, Yirui Wu, Liang-Jie Zhang 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (137 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15426 311 08$a9783031779534 311 08$a3031779533 327 $a -- Research Track. -- A Review of Link Prediction on Heterogeneous Networks. -- Research on Firefly Algorithm Enhancement by Diversifying Swarm. -- A Survey on Anomaly Detection With Few-Shot Learning. -- Electromyography-Based Intentional-Deception Behavior Analysis in an Interactive Social Context: Statistical Analysis and Machine Learning. -- Application Track. -- An Adaptive Hot Ranking Algorithm for Popular Item Recommendation in the Express Industry. -- Retrieval-Augmented Generation Architecture Framework: Harnessing the Power of RAG. -- Short Paper Track. -- Application and Optimization of Multi-Agent Reinforcement Learning in Collaborative Decision-Making. -- LLM-Based Automating Product Information Retrieval for Industry Analysis: A Real-World Application. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16?19, 2024. The 6 full papers and 2 short papers included in this book were carefully reviewed and selected from 10 submissions. They were organized in topical sections as follows: research track; application track; and short paper track. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15426 606 $aData protection$xLaw and legislation 606 $aComputer engineering 606 $aComputer networks 606 $aData protection 606 $aOperating systems (Computers) 606 $aPrivacy 606 $aComputer Engineering and Networks 606 $aData and Information Security 606 $aOperating Systems 615 0$aData protection$xLaw and legislation. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aData protection. 615 0$aOperating systems (Computers) 615 14$aPrivacy. 615 24$aComputer Engineering and Networks. 615 24$aData and Information Security. 615 24$aOperating Systems. 676 $a005.8 676 $a323.448 700 $aXu$b Ruifeng$01194302 701 $aChen$b Huan$01782749 701 $aWu$b Yirui$01782750 701 $aZhang$b Liang-Jie$01429323 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996630869903316 996 $aCognitive Computing - ICCC 2024$94309250 997 $aUNISA