Ajax security / Billy Hoffman and Bryan Sullivan
- Author:
- Hoffman, Billy, 1980-
- Published:
- Upper Saddle River, N.J. : Addison-Wesley, [2008]
- Copyright Date:
- ©2008
- Physical Description:
- 1 online resource (xxvi, 470 pages) : illustrations
- Additional Creators:
- Sullivan, Bryan, 1974-
Access Online
- Restrictions on Access:
- Restrictions unspecified
- Contents:
- Ch. 1. Introduction to Ajax Security -- Ch. 2. The Heist -- Ch. 3. Web Attacks -- Ch. 4. Ajax Attack Surface -- Ch. 5. Ajax Code Complexity -- Ch. 6. Transparency in Ajax Applications -- Ch. 7. Hijacking Ajax Applications -- Ch. 8. Attacking Client-Side Storage -- Ch. 9. Offline Ajax Applications -- Ch. 10. Request Origin Issues -- Ch. 11. Web Mashups and Aggregators -- Ch. 12. Attacking the Presentation Layer -- Ch. 13. JavaScript Worms -- Ch. 14. Testing Ajax Applications -- Ch. 15. Analysis of Ajax Frameworks -- App. A. Samy Source Code -- App. B. Source Code for Yamanner Worm.
- Subject(s):
- ISBN:
- 9780321491930
0321491939
9780132701921 (online)
0132701928
9780321544001 (online)
0321544005 - Reproduction Note:
- Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2011.
- Technical Details:
- Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212
- Action Note:
- digitized 2011 HathiTrust Digital Library committed to preserve
View MARC record | catkey: 37414961