CEH Module 17: Web Application Vulnerabilities
How To Detect Xss
10 Things Every WAF Should Provide [eBook]
Universal XSS via IE8s XSS Filters the sordid tale of a wayward hash sign slides: //p42.us/ie8xss
HI-TEC 2011 SQL Injection. Client’s Browser HTTP or HTTPS Web Server Apache or IIS HTML Forms CGI Scripts Database SQL Server or Oracle or MySQL ODBC.
Ceh v5 module 12 web application vulnerabilities
The Cross Site Scripting Guide
Xss.e xopresentation from eXo SEA
Top Ten Web Hacking Techniques (2010)
Unusual Web Bugs
Web Bugs
Post XSS Exploitation : Advanced Attacks and Remedies