Part 3 Attack resistance

Unlike parts 1 and 2, part 3 isn’t primarily concerned with fundamentals or development. Instead, everything revolves around Mallory as she devastates the other characters with attacks such as cross-site scripting, open redirect attacks, SQL injection, cross-site request forgery, clickjacking, and more. This is the most adversarial portion of the book. In each chapter, attacks don’t complement the main idea; attacks are the main idea.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.87.156