Download presentation
Presentation is loading. Please wait.
Published byRhoda Little Modified over 9 years ago
1
Chapter 16 The World Wide Web
2
FIGURE 16.0.F01: A very, very simple Web page. Courtesy of Dr. Richard Smith
3
FIGURE 16.0.F02: HTML source text that produced Figure 16.1.
4
FIGURE 16.0.F03: A hypertext link from an HTML document.
5
FIGURE 16.0.F04: Format of a URL, which is a Web page URI.
6
FIGURE 16.0.F05: Format of an email URL.
7
FIGURE 16.0.F06: Detailed format of the URL authority field.
8
FIGURE 16.0.F07: Retrieving a Web page using HTTP.
9
FIGURE 16.0.F08: Packet format for HTTP tunneling.
10
FIGURE 16.0.F09: Defaced U.S. Senate website, 1999. Courtesy of Dr. Richard Smith
11
FIGURE 16.0.F10: Authenticating the Web server with SSL.
12
FIGURE 16.0.F11: Firefox alert for a mismatched certificate name.
13
FIGURE 16.0.F12: Certificate information displayed by Firefox.
14
FIGURE 16.0.F13: Browser authenticates the bpn.gov certificate.
15
FIGURE 16.0.F14: Alice chooses, fills out, and submits a form.
16
FIGURE 16.0.F15: Executing a server-side script.
17
FIGURE 16.0.F16: Client-side HTML script in Javascript.
18
FIGURE 16.0.F17: Executing the client-side script in Figure 16.16. Courtesy of Dr. Richard Smith
19
FIGURE 16.0.F18: The initial website visit produces a cookie.
20
FIGURE 16.0.F19: The browser adds the cookie to the header in subsequent visits.
21
FIGURE 16.0.F20: Web content management system.
22
FIGURE 16.0.F21: Sample data tables from a sample database.
23
FIGURE 16.0.F22: Example of a SELECT command in SQL.
24
FIGURE 16.0.F23: Alice logs into a CMS-based website.
25
FIGURE 16.0.F24: Login masquerade using a command injection attack.
26
FIGURE 16.0.F25: An SQL command injection vulnerability.
27
FIGURE 16.0.F26: A password that always matches in SQL.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.