1. Spring security 3 : secure your web applications against malicious intruders with this easy to follow practical guide /: secure your web applications against malicious intruders with this easy to follow practical guide. (©2010) Other Names: Mularien, Peter Record Type: Book Extent: 1 online resource (x, 397 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. RESTful Java web services security : secure your RESTful applications against common vulnerabilities /: secure your RESTful applications against common vulnerabilities. (2014) Other Names: Enriquez, Rene; Salazar C., Andrés Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Practical cryptology and Web security. (2006) Other Names: Yuen, P. K Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Cross-site scripting attacks : classification, attack, and countermeasures /: classification, attack, and countermeasures. (2020) Authors: Gupta, B. B, 1982-; Chaudhary, Pooja Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications /: find and exploit vulnerabilities in web sites and applications. (2019) Authors: Sinha, Sanjib Record Type: Book Extent: 1 online resource (xvi, 225 pages. 140 illustrations) View Content: Available online (eLD content is only available in our Reading Rooms) ↗