Referenzen und weiterführende Literatur

[1]Sicherheit von Webanwendungen - Maßnahmenkatalog und Best Practices. 1, Bundesamt für Sicherheit in der Informationstechnik, 2006.

[2]W3C zurrt 2D-Vektorsprache SVG Tiny 1.2 fest. http://is.gd/ohcpxj, August 2006.

[3]Clickjacking with pointer-events. http://jsbin.com/imuca, 2010.

[4]How To Avoid Being Sidejacked. http://www.lockergnome.com/windows/2010/11/01/how-to-avoid-being-sidejacked/, November 2010.

[5]Open Web Application Security Project - OWASP Top 10 - 2010.,OWASP Foundation, http://owasptoplO.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf, 2010.

[6]Alexa Top 5OO Global Sites. http://www.alexa.com/topsites. Juli 2011.

[7]Clickjacking - SWITCH24.INFO Security Center. https://sites.google.com/site/switch24security/Home/clickjacking ...

Get Clickjacking und UI-Redressing – Vom Klick-Betrug zum Datenklau now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.