Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000uam a2200421 a 4500 
003    CaSebORM 
005    20200110024322.0 
006    m     o  d         
007    cr cn          
008    110614s2014    xx      o           eng   
024 8  9781118662090 
035    (CaSebORM)9781118662090 
041 0  eng 
100 1  Alcorn, Wade,|eauthor. 
245 14 The Browser Hacker's Handbook|h[O'Reilly electronic 
       resource] /|cAlcorn, Wade. 
250    1st edition 
264  1 |bWiley,|c2014. 
300    1 online resource (648 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
365    |b54.95 
520    Hackers exploit browser vulnerabilities to attack deep 
       within networks The Browser Hacker's Handbook gives a 
       practical understanding of hacking the everyday web 
       browser and using it as a beachhead to launch further 
       attacks deep into corporate networks. Written by a team of
       highly experienced computer security experts, the handbook
       provides hands-on tutorials exploring a range of current 
       attack methods. The web browser has become the most 
       popular and widely used computer "program" in the world. 
       As the gateway to the Internet, it is part of the 
       storefront to any business that operates online, but it is
       also one of the most vulnerable entry points of any 
       system. With attacks on the rise, companies are 
       increasingly employing browser-hardening techniques to 
       protect the unique vulnerabilities inherent in all 
       currently used browsers. The Browser Hacker's Handbook 
       thoroughly covers complex security issues and explores 
       relevant topics such as: Bypassing the Same Origin Policy 
       ARP spoofing, social engineering, and phishing to access 
       browsers DNS tunneling, attacking web applications, and 
       proxying—all from the browser Exploiting the browser and 
       its ecosystem (plugins and extensions) Cross-origin 
       attacks, including Inter-protocol Communication and 
       Exploitation The Browser Hacker's Handbook is written with
       a professional security engagement in mind. Leveraging 
       browsers as pivot points into a target's network should 
       form an integral component into any social engineering or 
       red-team security assessment. This handbook provides a 
       complete methodology to understand and structure your next
       browser penetration test. 
533    Electronic reproduction.|bBoston, MA :|cSafari,|nAvailable
       via World Wide Web. 
538    Mode of access: World Wide Web. 
542    |fCopyright © Wiley 
550    Made available through: Safari, an O’Reilly Media Company.
588 00 Online resource; Title from title page (viewed March 24, 
       2014) 
655  7 Electronic books.|2local 
700 1  Frichot, Christian,|eauthor. 
700 1  Orru, Michele,|eauthor. 
710 2  Safari, an O’Reilly Media Company. 
856 40 |zConnect to this resource online|uhttps://
       ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/-/9781118662090/?ar