The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren't designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need ...
Read More
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren't designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that's been virtually impossible to find, until now . Ajax Security systematically debunks today's most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace's Samy worm to MacWorld's conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You'll learn how to: - Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic - Write new Ajax code more safely--and identify and fix flaws in existing code - Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft - Avoid attacks based on XSS and SQL Injection--including a dangerous SQL Injection variant that can extract an entire backend database with just two requests - Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions--and recognize what you still must implement on your own - Create more secure "mashup" applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.
Read Less
Add this copy of Ajax Security to cart. $72.68, very good condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Ajax Security to cart. $72.68, very good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Ajax Security to cart. $76.68, very good condition, Sold by Goodwill of Silicon Valley rated 5.0 out of 5 stars, ships from San Jose, CA, UNITED STATES, published 2007 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Supports Goodwill of Silicon Valley job training programs. The cover and pages are in very good condition! The cover and any other included accessories are also in very good condition showing some minor use. The spine is straight there are no rips tears or creases on the cover or the pages.
Add this copy of Ajax Security to cart. $122.52, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Ajax Security to cart. $144.48, new condition, Sold by Just one more Chapter rated 3.0 out of 5 stars, ships from Miramar, FL, UNITED STATES, published 2007 by Addison-Wesley Professional.