Description |
1 online resource (xxvi, 470 pages) : illustrations |
Contents |
Ch. 1. Introduction to Ajax Security -- Ch. 2. The Heist -- Ch. 3. Web Attacks -- Ch. 4. Ajax Attack Surface -- Ch. 5. Ajax Code Complexity -- Ch. 6. Transparency in Ajax Applications -- Ch. 7. Hijacking Ajax Applications -- Ch. 8. Attacking Client-Side Storage -- Ch. 9. Offline Ajax Applications -- Ch. 10. Request Origin Issues -- Ch. 11. Web Mashups and Aggregators -- Ch. 12. Attacking the Presentation Layer -- Ch. 13. JavaScript Worms -- Ch. 14. Testing Ajax Applications -- Ch. 15. Analysis of Ajax Frameworks -- App. A. Samy Source Code -- App. B. Source Code for Yamanner Worm. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Reproduction |
Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2011. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Subject |
Ajax (Web site development technology)
|
|
Computer networks -- Security measures.
|
|
Computer security.
|
|
Computer Security |
|
Ajax (Technologie de développement de sites Web) |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Sécurité informatique. |
|
Ajax (Web site development technology) |
|
Computer networks -- Security measures. |
|
Computer security. |
|
Ajax (Web site development technology) |
|
Computer networks -- Security measures |
|
Computer security |
Added Author |
Sullivan, Bryan, 1974-
|
Other Form: |
Print version: Hoffman, Billy, 1980- Ajax security. Upper Saddle River, N.J. : Addison-Wesley, ©2008 (DLC) 2007037191 (OCoLC)171614027 |
ISBN |
9780321491930 |
|
0321491939 |
|
9780132701921 (online) |
|
0132701928 |
|
9780321544001 (online) |
|
0321544005 |
|