eBooks-it.org Logo
eBooks-IT.org Inner Image

Securing Ajax Applications

Ensuring the Safety of the Dynamic Web

Securing Ajax Applications Image

Book Details:

Publisher:O'Reilly Media
Series: OReilly
Author:Christopher Wells Exe
Edition:1
ISBN-10:0596529317
ISBN-13:9780596529314
Pages:256
Published:Jul 18 2007
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:1.94 MB

Book Description:

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur.Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your customers. This book presents basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies -- vital information that will ultimately save you time and money. Topics include:An overview of the evolving web platform, including APIs, feeds, web services and asynchronous messaging Web security basics, including common vulnerabilities, common cures, state management and session management How to secure web technologies, such as Ajax, JavaScript, Java applets, Active X controls, plug-ins, Flash and Flex How to protect your server, including front-line defense, dealing with application servers, PHP and scripting Vulnerabilities among web standards such as HTTP, XML, JSON, RSS, ATOM, REST, and XDOS How to secure web services, build secure APIs, and make open mashups secure Securing Ajax Applications takes on the challenges created by this new generation of web development, and demonstrates why web security isn't just for administrators and back-end programmers any more. It's also for web developers who accept the responsibility that comes with using the new wonders of the Web.

Download Link:

Related Books:

Google Web Toolkit GWT Java AJAX Programming

A step-by-step to Google Web Toolkit for creating Ajax applications fast
Google Web Toolkit GWT Java AJAX Programming Image
Each chapter covers a series of practical tasks, showing how to achieve a particular useful result and then learn how it works so that you can apply your knowledge to your own unique situation. Readers will need experience writing non-trivial applications using Java. Experience with developing web interfaces is useful, but knowledge of JavaScript and DHTML is not required GWT takes care of that!...

Ajax Construction Kit

Building Plug-and-Play Ajax Applications
Ajax Construction Kit Image
Supercharge Your Sites with Ajax Right Now...No Scripting Expertise Needed! You've heard how great Ajax is--how it can help make your Web sites more usable, more interactive, more responsive, more successful. Ajax Construction Kit lets you put Ajax to work right now, even if you've never written a script! Just learn a few essentials, check out a few examples, then run the live CD and discover all the plug-and-play code you need to hit the ground running. Ajax Construction Kit 's built-in applications work right out of the box. And with easy guidance from Michael Morrison, you'll gradually deepen your understanding--learn how to customize, extend, and reuse these applications---and even build skills for creating new ones. Walk away an expert. ...

Hacking and Securing iOS Applications

Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications Image
If you're an app developer with a solid foundation in Objective-C, this book is an absolute must chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications and avoid the same problems in your apps Learn how attackers infect apps with malware through code in...



2007 - 2021 © eBooks-IT.org