Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Security

Buy
Ajax Security, 9780321491930 (0321491939), Addison Wesley, 2007
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren’t designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that’s been virtually impossible to find, until now.

            Ajax Security systematically debunks today’s most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace’s Samy worm to MacWorld’s conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You’ll learn how to:

 

·        Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic

·        Write new Ajax code more safely—and identify and fix flaws in existing code

·        Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft

·        Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests

·        Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own

·        Create more secure “mashup” applications

 

Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.

 


About the Author


Billy Hoffman is the lead researcher for HP Security Labs of HP Software. At HP, Billy focuses on JavaScript source code analysis, automated discovery of Web application vulnerabilities, and Web crawling technologies. He has worked in the security space since 2001 after he wrote an article on cracking software for 2600, “The Hacker Quarterly,” and learned that people would pay him to be curious. Over the years Billy has worked a variety of projects including reverse engineering file formats, micro-controllers, JavaScript malware, and magstripes. He is the creator of Stripe Snoop, a suite of research tools that captures, modifies, validates, generates, analyzes, and shares data from magstripes. Billy’s work has been featured in Wired, Make magazine, Slashdot, G4TechTV, and in various other journals and Web sites.

 

Bryan Sullivan is a software development manager for the Application Security Center division of HP Software. He has been a professional software developer and development manager for over 12 years, with the last five years focused on the Internet security software industry. Prior to HP, Bryan was a security researcher for SPI Dynamics, a leading Web application security company acquired by HP in August 2007.While at SPI, he created the DevInspect product, which analyzes Web applications for security vulnerabilities during development.

(HTML tags aren't allowed.)

Microsoft RPC Programming Guide (Nutshell Handbooks)
Microsoft RPC Programming Guide (Nutshell Handbooks)

Remote Procedure Call (RPC) is the glue that holds together MS-DOS, Windows 3.x, and Windows NT. It is a client-server technology -- a way of making programs on two different systems work together like one. The advantage of RPC over other distributing programming techniques is that you can link two systems together using simple C...

Microsoft Office Excel 2003 Step by Step
Microsoft Office Excel 2003 Step by Step
You’ll notice some changes as soon as you start Microsoft Excel 2003. The toolbars
and menu bar have a new look, and there are some new task panes available on the
right side of your screen. But the features that are new or greatly improved in this
version of Excel go beyond just changes in appearance. Some changes won’t
...
Drupal 7 Module Development
Drupal 7 Module Development

This book takes a hands-on, practical approach to software development. The authors, all professional Drupal developers and contributors to the Drupal project, provide accessible coding samples designed to exhibit not only the technical merits and abilities of Drupal, but also proper architectural and stylistic approaches to coding on one of...


Network Security Illustrated
Network Security Illustrated
Organized around common business problems instead of technology, this easily navigable, illustrated reference will help you:

1. Understand major security concepts and solutions
2. Identify limitations and risks in security strategies
3. Select and implement solutions that are right for your needs
...
Women Drug Traffickers: Mules, Bosses, and Organized Crime (Diálogos Series)
Women Drug Traffickers: Mules, Bosses, and Organized Crime (Diálogos Series)

In the flow of drugs to the United States from Latin America, women have always played key roles as bosses, business partners, money launderers, confidantes, and couriers―work rarely acknowledged. Elaine Carey’s study of women in the drug trade offers a new understanding of this intriguing subject, from women drug smugglers in the...

The Seven Secrets of How to Think Like a Rocket Scientist
The Seven Secrets of How to Think Like a Rocket Scientist

This book translates "thinking like a rocket scientist" into every day thinking so it can be used by anyone. It’s short and snappy and written by a rocket scientist. The book illustrates the methods (the 7 secrets) with anecdotes, quotations and biographical sketches of famous scientists, personal stories and insights, and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy