• List Price: CDN$ 93.57
  • You Save: CDN$ 1.80 (2%)
Usually ships within 3 to 5 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.
XSS Attacks: Cross Site S... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Very Good | Details
Sold by bwbuk_ltd
Condition: Used: Very Good
Comment: Ships from the UK. Former Library book. Great condition for a used book! Minimal wear. 100% Money Back Guarantee. Your purchase also supports literacy charities.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

XSS Attacks: Cross Site Scripting Exploits and Defense Paperback – May 9 2007

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 91.77
CDN$ 74.70 CDN$ 39.46

Save an Additional 10% on Textbooks When you Join Amazon Student

Special Offers and Product Promotions

  • Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 480 pages
  • Publisher: Syngress; 1 edition (May 9 2007)
  • Language: English
  • ISBN-10: 9781597491549
  • ISBN-13: 978-1597491549
  • ASIN: 1597491543
  • Product Dimensions: 18.8 x 2.8 x 23.9 cm
  • Shipping Weight: 1 Kg
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #86,291 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Product Description

About the Author

Seth Fogie is the VP of Dallas-based Airscanner Corporation where he oversees the development of security software for the Window Mobile (Pocket PC) platform. He has co-authored numerous technical books on information security, including the top selling"

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x968bb390) out of 5 stars 6 reviews
17 of 17 people found the following review helpful
HASH(0x968bd0f0) out of 5 stars Originality and coverage earn four stars, but a better book is needed July 20 2007
By Richard Bejtlich - Published on Amazon.com
Format: Paperback
XSS Attacks earns 4 stars for being the first book devoted to Cross Site Scripting and for rounding up multiple experts on the topic. The authors are synonymous with attacking Web applications and regularly share their vast expertise via their blogs and tools. However, XSS Attacks suffers the same problems found whenever Syngress rushes a book to print -- nonexistent editing and uneven content. I found XSS Attacks to be highly enlightening, but I expect a few other books on the topic arriving later this year could be better.

First, as Tadaka mentioned, ch 3 is the best written part of the book. In fact, the author of ch 3 should have written the entire book. There is a difference between an author of a tool, an author of a blog, and an author of a book. The author of ch 3 clearly knows how to make a clear argument over the course of a long stretch of pages (over 90) and carry the reader. Lucky for non-book-buyers, Syngress posted ch 3 for free on their Web site. You'll get a great foundation on XSS, and learn about CSRF and backdooring Flash and Quicktime.

In terms of readability, ch 2 wasn't bad. I liked trying out various Firefox extensions and the author's examples were good. I think ch 1 should be completely dropped. It mentions terms not defined until ch 2. The language is exceptionally rough, indicating zero editing was done. The DNS pinning examples in ch 5 were confusing; it doesn't help novice readers to discuss [...] and then use [...]. (I think that's an error.) I really didn't get as much from the book past ch 3 as I did from ch 3.

The major take-away from XSS Attacks is that one should never trust clients. Furthermore, far too many vulnerable capabilities exist in applications most people would never dream of fearing, like those that render .pdf or .swf. I really liked the point that browsers constantly interpret and "fix" broken HTML, sometimes to the detriment of the security world. I also liked reading how users can be duped by attacks against the integrity of data, such as adding or removing details of Web sites.

Right now, if you want to learn more about recent XSS attacks in printed form, this book is your main option. Last year I favorably reviewed Lance James' book, Phishing Exposed, which includes some of these techniques. Later this year one of the other book reviewers, Dafydd Stuttard, should be publishing The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws. Syngress claims to be publishing Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer in the fall. Hacking Exposed Web 2.0 by Himanshu Dwivedi is another option, but I find his security books to be poorly written. I highly recommend visiting the authors' blogs, since they cover a lot of the information in XSS Attacks.
6 of 6 people found the following review helpful
HASH(0x96925ec4) out of 5 stars Great for beginners and experts July 4 2007
By Dafydd Stuttard - Published on Amazon.com
Format: Paperback
This book is a comprehensive analysis of XSS and related vulnerabilities, and covers everything from a beginner's introduction to XSS through to advanced exploitation and the latest attack techniques.

Overall, the book is well-organised, technically accurate, and full of pertinent examples and code extracts to illustrate the different vulnerabilities and attacks being described. There are plenty of tricks that will benefit even experienced web app hackers, including a wealth of filter bypasses, and coverage of offbeat topics such as injection into style sheets and use of non-standard content encoding.

There is strong coverage of recent research including JavaScript-based port scanning, history stealing and JSON hijacking, as you would expect given that these techniques were largely poineered by some of the authors. All of their explanations are clear and precise, and contain sufficient detail for you to fully understand each issue, and put together working code to exploit it. The book also includes the use of non-standard vehicles such as Flash and PDF for delivery of XSS attacks.

Here and there, the book displays the effects of multiple authorship, notably in the discussion of the best tools for finding XSS flaws. I know that some of the authors have rather opposing views on that question, but it is always good to get different people's perspectives on the tools they find most useful. There are also a few typos and editorial glitches, but that is the price you pay for being quick to market, as they evidently are.

Overall, this is a great book that will benefit a wide range of people, from novices to seasoned hackers. It is fun to read, with plenty of lighter moments punctuating the technical meat. Nothing else currently available is hitting this target - get it while it's hot!
1 of 1 people found the following review helpful
HASH(0x9693096c) out of 5 stars Solid Coverage of Cross Site Scripting July 2 2007
By Jason Wood - Published on Amazon.com
Format: Paperback
I've been through most of this book and found it to be an excellent source of information on cross site scripting (XSS). It starts off with a good introduction of the subject, covers the tools to help you evaluate your site for issues with XSS, and then goes through XSS non-stop to the end. I really liked the discussion of XSS theory in chapter 3. Instead of just covering how to look up and try different exploit methods, the authors spend a lot of time trying to convey the knowledge needed to really understand how XSS takes advantage of web apps and your browser's willingness to try and render as much as possible. This is extremely helpful when trying to craft your defenses, since you will have a more complete understanding of the problem.

The book is a lot to absorb and I'm still wrapping my mind around it, but it has really given me a new perspective on the scope of the issue. The authors are the experts on XSS and they've done a really good job on the book. If you want to get information straight from the guys doing the research on XSS, then this is the book you want.
1 of 1 people found the following review helpful
HASH(0x968bd294) out of 5 stars Comprehensive content but with a lot of errors and poorly written March 29 2009
By Angelos Orfanakos - Published on Amazon.com
Format: Paperback Verified Purchase
This is a good book for getting started with XSS, with comprehensive information about the subject, but with quite a few significant drawbacks:

- There are a lot of spelling errors (almost one per page)
- There's not a straightforward structure of content
- It's very apparent that this has been written separately by many authors: there doesn't seem to be an effort to provide a single, similar and coherent writing style (e.g. in the same chapter, each section has its own little introduction, repeating things already mentioned in previous sections)
- It has had a very poor technical and editorial review (as shown by the many mistakes)
- It contains some strange things that make you wonder about how much thought was put while making the book (e.g. screenshots of full-black webpages)

Given the fact that there aren't many books on the subject, this is one you'd probably want to buy, but be prepared for a lot of mistakes and oversights.
1 of 1 people found the following review helpful
By jessie - Published on Amazon.com
Format: Kindle Edition Verified Purchase
It was a good book but the formatting was very weird and as such highlighting does not work at least on my iPad.