1. The Basics -- 2. Passing Data to Subsystems -- 3. User Input -- 4. Output Handling: The Cross-site Scripting Problem -- 5. Web Trojans -- 6. Passwords and Other Secrets -- 7. Enemies of Secure Code -- 8. Summary of Rules for Secure Coding -- App. A. Bugs in the Web Server -- App. B. Packet Sniffing -- App. C. Sending HTML Formatted E-mails with a Forged Sender Address
Notes
Formerly CIP. Uk
Bibliography
Includes bibliographical references (pages 209-219) and index