Useful Links
Computer Science
Cybersecurity
Web Security and Privacy
1. Introduction to Web Security and Privacy
2. Core Web Technologies and Security Models
3. Client-Side Vulnerabilities
4. Server-Side Vulnerabilities
5. Cryptography in Web Security
6. Authentication and Authorization
7. Web Privacy
8. Secure Development Lifecycle
9. Advanced Web Security Topics
Web Privacy
User Tracking Mechanisms
Cookies
First-party Cookies
Third-party Cookies
Cookie Attributes
Secure
HttpOnly
SameSite
Tracking Pixels
Mechanism of Operation
Use in Analytics and Advertising
Local Storage Objects
LocalStorage
SessionStorage
IndexedDB
Browser Fingerprinting
Canvas Fingerprinting
How Canvas Fingerprinting Works
Evasion Techniques
WebGL Fingerprinting
Graphics Hardware Identification
Font Fingerprinting
System Font Enumeration
AudioContext Fingerprinting
Audio Processing Fingerprinting
Privacy-Enhancing Technologies
Tor and Anonymity Networks
Onion Routing
Tor Browser
Virtual Private Networks
VPN Protocols
Privacy Limitations
Privacy-focused Browsers
Features and Limitations
Comparison with Mainstream Browsers
Data Protection Regulations
General Data Protection Regulation
Key Principles
Data Subject Rights
Enforcement and Penalties
California Consumer Privacy Act
Consumer Rights
Business Obligations
User Consent and Data Minimization
Consent Mechanisms
Minimizing Data Collection
Data Retention Policies
De-anonymization Techniques
Re-identification Attacks
Data Correlation Methods
Previous
6. Authentication and Authorization
Go to top
Next
8. Secure Development Lifecycle