Description
Explaining how to protect Web 2.0 architecture from different types of cybercrime, a team of Internet security professionals demonstrates how hackers work to infiltrate and attack Web 2.0-based services and demonstrates a variety of specific countermeasures and defense techniques that can prevent crimes, with real-world case studies that illustrate social networking site weaknesses, IE7 shortcomings, migration vulnerabilities, and more. Original. (Intermediate)