When Ajax Attacks! Web application security fundamentals
How to Get Real Security
Oracle Database Security
Healthy Food, Healthy Communities : An Assessment and Scorecard of Community Food Security In the District of Columbia
"Am I going to be happy and financially stable?" : How American women feel when they think about financial security
Implicit Social Security Tax Rates across Labor Supply Margins
Innovative strategies to help maximize Social Security benefits
Security analysts' career concerns and herding of earnings forecasts
The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management
Information Security Management System ISO 27001:2005
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren’t designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that’s been virtually impossible to find, until now.
Ajax Security systematically debunks today’s most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace’s Samy worm to MacWorld’s conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You’ll learn how to:
· Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic
· Write new Ajax code more safely—and identify and fix flaws in existing code
· Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests
· Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own
· Create more secure “mashup” applications
Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.
Use coupon below to get discount at eCampus.com!
$3 off textbook orders over $75
$4 off textbook orders over $90
$5 off textbook orders over $100
Copy the coupon code before clicking the button!
|Amazon US||Paperback||$3.12 - $54.99|
This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and ...
The practicing programmer's DEITEL® guide to AJAX, Rich Internet Applications, and web-application developmentThis book applies the Deitel signature live-code approach to teaching Web ...
This study of the Employee Retirement Income Security Act of 1974 (ERISA) explains in detail how public officials in the executive branch and Congress overcame strong opposition from business and ...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work ...
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics ...
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. ...
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and ...
The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of ...
How much do you know about . . . ObesitySleepMeteorsAliensBeesSperm banks Sex in spaceDuct ...
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards ...