Ajax Security

Ajax Security
Author :
Publisher : Addison-Wesley Professional
Total Pages : 453
Release :
ISBN-10 : 9780132701921
ISBN-13 : 0132701928
Rating : 4/5 (21 Downloads)

Book Synopsis Ajax Security by : Billy Hoffman

Download or read book Ajax Security written by Billy Hoffman and published by Addison-Wesley Professional. This book was released on 2007-12-06 with total page 453 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren’t designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that’s been virtually impossible to find, until now. Ajax Security systematically debunks today’s most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace’s Samy worm to MacWorld’s conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.


Ajax Security Related Books

Ajax Security
Language: en
Pages: 453
Authors: Billy Hoffman
Categories: Computers
Type: BOOK - Published: 2007-12-06 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditi
Web 2.0 Security
Language: en
Pages: 365
Authors: Shreeraj Shah
Categories: Computers
Type: BOOK - Published: 2008 - Publisher: Course Technology PTR

DOWNLOAD EBOOK

Accompanied a CD-ROM containing tools, Flash-based demos, sample code, and more, a practical handbook introduces a wide variety of next generation security cont
Secure ASP.NET AJAX Development (Digital Short Cut)
Language: en
Pages: 122
Authors: Jason Schmitt
Categories: Computers
Type: BOOK - Published: 2006-11-17 - Publisher: Pearson Education

DOWNLOAD EBOOK

This is the eBook version of the printed book. Many organizations are diving headfirst into AJAX technologies to make their Web applications richer and more use
Foundations of Ajax
Language: en
Pages: 283
Authors: Nathaniel Schutta
Categories: Computers
Type: BOOK - Published: 2006-11-09 - Publisher: Apress

DOWNLOAD EBOOK

* Ajax is one of the hottest topics in the developer community right now! and this will be the first Ajax book that offers detailed explanation of how Ajax work
Securing Ajax Applications
Language: en
Pages: 252
Authors: Christopher Wells
Categories: Computers
Type: BOOK - Published: 2007-07-11 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away.