The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes.
The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes
Foreword Chapter 1 The Zen of Hack Proofing Introduction Learning to Appreciate the Tao of the Hack Hacker Cracker Script Kiddie Phreaker Black Hat,White Hat,What’s the Difference Gray Hat The Role of the Hacker Criminal Magician Security Professional Consumer Advocate Civil Rights Activist Cyber Warrior Motivations of a Hacker Recognition Admiration Curiosity Power and Gain Revenge The Hacker Code Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Classes of Attack Introduction Identifying and Understanding the Classes of Attack Denial of Service Information Leakage Regular File Access Misinformation Special File/Database Access Remote Arbitrary Code Execution Elevation of Privileges Identifying Methods of Testing for Vulnerabilities Proof of Concept Standard Research Techniques Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Reviewing the Fundamentals of XML Introduction An Overview of XML The Goals of XML What Does an XML Document Look Like Creating an XML Document Well-Formed XML Documents Transforming XML through XSLT XSL Use of Patterns XPath Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Document Type: The Validation Gateway Introduction Document Type Definitions and Well-Formed XML Documents Schema and Valid XML Documents XML Schema Data Types Learning About Plain-Text Attacks Plain-Text Attacks Understanding How Validation Is Processed in XML
- No. of pages:
- © Syngress 2002
- 16th August 2002
- eBook ISBN:
- Paperback ISBN: