Hacking Exposed Web 2.0 and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $52.00
  • Save: $16.26 (31%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Hacking Exposed Web 2.0: ... has been added to your Cart
+ $3.99 shipping
Used: Very Good | Details
Condition: Used: Very Good
Comment: Former Library book. Great condition for a used book! Minimal wear. 100% Money Back Guarantee. Shipped to over one million happy customers. Your purchase benefits world literacy!
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions Paperback – December 17, 2007

ISBN-13: 978-0071494618 ISBN-10: 0071494618 Edition: 1st

Buy New
Price: $35.74
33 New from $5.81 42 Used from $0.01 1 Collectible from $9.98
Amazon Price New from Used from
"Please retry"
Paperback, December 17, 2007
$5.81 $0.01
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Frequently Bought Together

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions + Hacking Exposed Web Applications, Third Edition
Price for both: $65.31

Buy the selected items together

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Series: Hacking Exposed
  • Paperback: 258 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (December 17, 2007)
  • Language: English
  • ISBN-10: 0071494618
  • ISBN-13: 978-0071494618
  • Product Dimensions: 7.3 x 0.6 x 9 inches
  • Shipping Weight: 1.1 pounds (View shipping rates and policies)
  • Average Customer Review: 3.3 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #1,801,403 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Rich Cannings is a senior information security engineer at Google.

Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization, and the author of several security books.

Zane Lackey is a senior security consultant with iSEC Partners.

Customer Reviews

3.3 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

11 of 12 people found the following review helpful By Kornienko Mikhail on January 29, 2008
Format: Paperback Verified Purchase
I'm still in the middle of the book, and I definitely will skim thru all the remaining pages (just because I paid for it), but I wouldn't recommend the book to anyone looking for serious and in-depth study on web security - the book just doesn't offer that. What it does is a list of possible attack vectors and sometimes offers "solutions" which can help to fight with the attacks. However, the attacks descriptions are shallow, solutions are very short and non-extensive and many of them go as far as telling a user to install NoScript extension for Firefox (huh? Web 2.0 doesn't work with no JavaScript).

There are also quadrillions of links to a security-related site (won't list it here) which offers a toolbar to checks your sites again the most common security problems. I don't have anything against links to useful tools of course, but THAT amount of links just makes this book look like an advertisement of the fore-mentioned site. Am not even talking about page space wasted to re-iterate "go to ...., install ...., click .... in order to test for ....." which usually take 0.5-1 pages. Users who read that sort of books can somehow figure out how to use a toolbar, I believe.

I'm not by any means a security expert, and this book did introduce me into the topic, but it didn't do anything beyond that. I still need to read some other book on the topic, and that book will probably contain the same info as the Hacking Web 2.0 Exposed (i.e. the very basic info on web expoits), so.. I actually just recommend to pass on this book at all, and look for something which covers the topic in greater depth.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By James Rogers on February 25, 2008
Format: Paperback
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Hacking Exposed)

The Hacking Exposed Web 2.0 book has proven to be a fairly huge disappointment for me. After some quality technical books in this series, the publisher has released what amounts to a sales tool for the author's software.

The front cover states "Web 2.0 Security Secrets and Solutions" but the inside of the book hasn't really lived up to that hype. Normally, when it comes to books by McGraw Hill with the Hacking Exposed title, I can expect a decent amount of technical detail on the topic at hand. With this book, it was a bit different. Now, before you think I'm blasting this book entirely, I want to make perfectly clear that there is valid information in this book, but in my opinion, it's pretty basic stuff. If you're a beginner in the world of web hacking, then this book might be worthwhile. However, if you've done much web hacking at all, I think you'll be discouraged at the basic nature of the information included.

The sales pitch starts right in Chapter 1 as the iSec Partners push their Security QA toolbar for web assessments. If you visit their website, they have two separate sections that contain potential software you can download and use. The Products section will allow you to download the trial version of this toolbar, but you have to talk to a sales person to get pricing on the software. But a good deal of the content they discuss in the book is based on this tool.

Now, with that said, there are good points for the book as well.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Chris Gates on March 15, 2008
Format: Paperback
Thanks to McGraw-Hill for my review copy.

Based on my review criteria this book should have easily been a 4 or 5 star book, but I gave it 3 stars for its major flaw. Its major flaw is that it only talks about iSec partner's SecurityQA Toolbar as a tool for testing for the different types of web application vulnerabilities. Only discussing one closed source, for pay tool, that only runs on Windows is really disappointing from a security professional standpoint. I really expected a good snapshot in time on the DIFFERENT tools and techniques for doing web 2.0 auditing. There are tons of "for-pay" and more importantly FREE web application scanners and tools that look for the same vulnerabilities discussed in the book and the fact that they don't mention any other tools or methods is very disappointing.

Now that the above is out of the way...lets get on with the likes and dislikes.

-The analysis of the samy worm is excellent. They break the code apart and really analyze what's going on and why it worked at the time.
-The chapter on ActiveX security is excellent. It covers a lot of ground on why ActiveX controls are bad, how to fuzz them and how to defend against them.
-The whole first part of the book on Web 1.0 vulnerabilities is well written, I had just finished XSS attacks and having that background helped a lot with the relevant chapters in HE Web 2.0.

-The book is short, about 246 pages, that's probably too short for the price for a security book.
-A good chunk of the chapters cover over and over installing and using their SecurityQA Toolbar, I only need it once, if that.
-I think the book stops a bit short of actually exploiting Web 2.0 vulnerabilities. It talks a lot about identifying which 2.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

More About the Author

Discover books, learn about writers, read author blogs, and more.

What Other Items Do Customers Buy After Viewing This Item?