Book Details:
Pages: | 504 |
Published: | Dec 16 2007 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 12.42 MB |
Book Description:
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren't designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that's been virtually impossible to find, until now. Ajax Security systematically debunks today's most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace's Samy worm to MacWorld's conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You'll learn how to: Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic Write new Ajax code more safely-and identify and fix flaws in existing code Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft Avoid attacks based on XSS and SQL Injection-including a dangerous SQL Injection variant that can extract an entire backend database with just two requests Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions-and recognize what you still must implement on your own Create more secure 'mashup' applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.
Data processing, Security, Caching, XML, Web Services, and Ajax
This practical book is built entirely around example code, covering the most popular and up-to-date topics on using PHP in conjunction with Oracle. The book explains in extensive detail how to build robust, efficient, and secure PHP/Oracle solutions. Although this book covers only the most popular and up-to-date topic areas on the use of PHP in conjunction with Oracle, the author does not make any assumption about the skill level of the reader. Packed with information in an easy-to-read format, the book is ideal for any PHP developer who deals with Oracle....
Defending AJAX, RIA and SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns to the fi eld of Web application security. Yamanner-, Sammy-, and Spaceflash-type worms are exploiting client-side Ajax frameworks, providing new avenues of attack, and compromising confidential information. Portals such as Google, Netflix, Yahoo, and MySpace have witnessed new vulnerabilities recently, and these vulnerabilities can be leveraged by attackers to perform phishing, cross-site scripting...
A step-by-step to Google Web Toolkit for creating Ajax applications fast
Each chapter covers a series of practical tasks, showing how to achieve a particular useful result and then learn how it works so that you can apply your knowledge to your own unique situation. Readers will need experience writing non-trivial applications using Java. Experience with developing web interfaces is useful, but knowledge of JavaScript and DHTML is not required GWT takes care of that!...
2007 - 2021 © eBooks-IT.org