Tabla de Contenidos:
  • Ch. 1. Introduction to Ajax Security
  • Ch. 2. The Heist
  • Ch. 3. Web Attacks
  • Ch. 4. Ajax Attack Surface
  • Ch. 5. Ajax Code Complexity
  • Ch. 6. Transparency in Ajax Applications
  • Ch. 7. Hijacking Ajax Applications
  • Ch. 8. Attacking Client-Side Storage
  • Ch. 9. Offline Ajax Applications
  • Ch. 10. Request Origin Issues
  • Ch. 11. Web Mashups and Aggregators
  • Ch. 12. Attacking the Presentation Layer
  • Ch. 13. JavaScript Worms
  • Ch. 14. Testing Ajax Applications
  • Ch. 15. Analysis of Ajax Frameworks
  • App. A. Samy Source Code
  • App. B. Source Code for Yamanner Worm.