Meghanathan Natarajan, Johnson Deshante C, Geoghegan Alexander R
The security vulnerabilities hidden in software programs pose a major threat, on the computers and networks, when appropriately exploited by a malicious user. The vulnerabilities arise primarily due to the coding errors and/or flaws in the underlying platform. The book researches on the well-known coding and platform vulnerabilities related to the security of software programs and the attacks they lead to. Specifically, the following software security attacks are analyzed in detail: SQL injection attacks, Cross-site scripting (XSS) attacks, Cross-site request forgery (XSRF) attacks, and the...
The security vulnerabilities hidden in software programs pose a major threat, on the computers and networks, when appropriately exploited by a malicio...
The book is organized into two modules: In the first module, we present a tutorial on socket programming in Java, illustrating complete examples for simplex and duplex communications with both connectionless datagram and connection-oriented stream-mode sockets. In addition, this module explains in detail, with examples, the differences between a concurrent server and iterative server and the use of the Multicast socket API. In the second module, we present the source code analysis of a file reader connection-oriented server socket Java program, to illustrate the identification, impact...
The book is organized into two modules: In the first module, we present a tutorial on socket programming in Java, illustrating complete examples for s...