Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users t[...]