Review of XSS Attacks Posted
Very shortly Amazon.com should post my four star review of Cross Site Scripting Attacks: XSS Exploits and Defense. Observe that no one (Amazon.com, Syngress) displays the actual cover for this book on their Web sites. From the review:
XSS Attacks earns 4 stars for being the first book devoted to Cross Site Scripting and for rounding up multiple experts on the topic. The authors are synonymous with attacking Web applications and regularly share their vast expertise via their blogs and tools. However, XSS Attacks suffers the same problems found whenever Syngress rushes a book to print -- nonexistent editing and uneven content. I found XSS Attacks to be highly enlightening, but I expect a few other books on the topic arriving later this year could be better.
Thanks to Syngress I have review copies of Snort Intrusion Detection and Prevention Toolkit and Stealing the Network: How to Own a Shadow, which I plan to read soon. More late nights in my future...
XSS Attacks earns 4 stars for being the first book devoted to Cross Site Scripting and for rounding up multiple experts on the topic. The authors are synonymous with attacking Web applications and regularly share their vast expertise via their blogs and tools. However, XSS Attacks suffers the same problems found whenever Syngress rushes a book to print -- nonexistent editing and uneven content. I found XSS Attacks to be highly enlightening, but I expect a few other books on the topic arriving later this year could be better.
Thanks to Syngress I have review copies of Snort Intrusion Detection and Prevention Toolkit and Stealing the Network: How to Own a Shadow, which I plan to read soon. More late nights in my future...
Comments
I have been browsing through your blog and have a question regarding a very old post of yours titled "Security 101 Book" @ http://taosecurity.blogspot.com/search?updated-min=2003-01-01T00%3A00%3A00-05%3A00&updated-max=2004-01-01T00%3A00%3A00-05%3A00&max-results=50
You wrote "...They also correct state the risk equation as "risk = threat X vulnerability X asset value.""
With 4(?) years since you posted that, what do you think about the the risk equation looks like? I have also read your other related posts (the ones on MS threat modelling).
With all the ambiguity about definition of threat, vulnerability et at, i would like to know your thoughts about what a risk equation (may) look like.
I am of the opinion that the the Risk = Asset Val x Threat x Vuln is fine, it needs to be made more granular.
thanks
- es
I'm going to duck that question for now since it's a big issue. HOWEVER, I may be writing a book with Lance Spitzner on risk that will directly address it.
One method I found interesting, but am evaluating is FAIR @ http://riskmanagementinsight.com/ . They have an interesting way of approaching risk analysis.
Look forward to hear an announcement on your book with Lance :)
- es (Etaoin L Shrdlu)
"... ch 3 is the best written part of the book. In fact, the author of ch 3 should have written the entire book. ... Lucky for non-book-buyers, Syngress posted ch 3 for free on their Web site."
It has been replaced by Chapter 1, of which you commented:
"I think ch 1 should be completely dropped."
The Syngress page:
http://www.elsevierdirect.com/product.jsp?isbn=9781597491549#samplechaptertext
Oh well.
Thanks for all of your great work and information.
-Robert