Ajax security /
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Autres auteurs: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Upper Saddle River, N.J. :
Addison-Wesley,
©2008.
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- Ch. 1. Introduction to Ajax Security
- Ch. 2. The Heist
- Ch. 3. Web Attacks
- Ch. 4. Ajax Attack Surface
- Ch. 5. Ajax Code Complexity
- Ch. 6. Transparency in Ajax Applications
- Ch. 7. Hijacking Ajax Applications
- Ch. 8. Attacking Client-Side Storage
- Ch. 9. Offline Ajax Applications
- Ch. 10. Request Origin Issues
- Ch. 11. Web Mashups and Aggregators
- Ch. 12. Attacking the Presentation Layer
- Ch. 13. JavaScript Worms
- Ch. 14. Testing Ajax Applications
- Ch. 15. Analysis of Ajax Frameworks
- App. A. Samy Source Code
- App. B. Source Code for Yamanner Worm.