Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Security

Buy
Ajax Security, 9780321491930 (0321491939), Addison Wesley, 2007
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren’t designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that’s been virtually impossible to find, until now.

            Ajax Security systematically debunks today’s most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace’s Samy worm to MacWorld’s conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You’ll learn how to:

 

·        Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic

·        Write new Ajax code more safely—and identify and fix flaws in existing code

·        Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft

·        Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests

·        Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own

·        Create more secure “mashup” applications

 

Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.

 


About the Author


Billy Hoffman is the lead researcher for HP Security Labs of HP Software. At HP, Billy focuses on JavaScript source code analysis, automated discovery of Web application vulnerabilities, and Web crawling technologies. He has worked in the security space since 2001 after he wrote an article on cracking software for 2600, “The Hacker Quarterly,” and learned that people would pay him to be curious. Over the years Billy has worked a variety of projects including reverse engineering file formats, micro-controllers, JavaScript malware, and magstripes. He is the creator of Stripe Snoop, a suite of research tools that captures, modifies, validates, generates, analyzes, and shares data from magstripes. Billy’s work has been featured in Wired, Make magazine, Slashdot, G4TechTV, and in various other journals and Web sites.

 

Bryan Sullivan is a software development manager for the Application Security Center division of HP Software. He has been a professional software developer and development manager for over 12 years, with the last five years focused on the Internet security software industry. Prior to HP, Bryan was a security researcher for SPI Dynamics, a leading Web application security company acquired by HP in August 2007.While at SPI, he created the DevInspect product, which analyzes Web applications for security vulnerabilities during development.

(HTML tags aren't allowed.)

Ajax Construction Kit: Building Plug-and-Play Ajax Applications (Negus Live Linux Series)
Ajax Construction Kit: Building Plug-and-Play Ajax Applications (Negus Live Linux Series)
This whole book idea started as a bet I had with my editor that we couldn't pick two random techie topics and tie them together in a book. Two darts flew through the air and the topics "Ajax" and "live CDs" ended up being the result. This book could've just as easily been about Blu-ray on Rails or iPod design patterns. So it's...
Computer Architecture Techniques for Power-Efficiency (Synthesis Lectures on Computer Architecture)
Computer Architecture Techniques for Power-Efficiency (Synthesis Lectures on Computer Architecture)
In the last few years, power dissipation has become an important design constraint, on par with performance, in the design of new computer systems. Whereas in the past, the primary job of the computer architect was to translate improvements in operating frequency and transistor count into performance, now power efficiency must be taken into account...
Rethinking Sales Management: A Strategic Guide for Practitioners
Rethinking Sales Management: A Strategic Guide for Practitioners

Until recently, sales managers received no specific training for their jobs. However, selling has become more complex with the emergence of regulations and more sophisticated customers. Sales managers need to inspire and achieve sales results by managing teams of professionals and other resources. To do so, they need guidance on dealing with...


The Physics of Football: Discover the Science of Bone-Crunching Hits, Soaring Field Goals, and Awe-Inspiring Passes
The Physics of Football: Discover the Science of Bone-Crunching Hits, Soaring Field Goals, and Awe-Inspiring Passes
"Whether your primary interest is popular science or pro football, you will enjoy FOOTBALL PHYSICS." (Bill Belichick, head coach, New England Patriots )

"Football Physics is great fun. It taught me more about football than 50 years of watching the game." (Robert K. Adair, Ph.D., author of Physics of Baseball )...
Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
We live in an era in which parallel computing has become mainstream and very affordable. This is mainly because hardware costs have come down rapidly. With the advent of the Internet, we also experience the phenomenon of data explosion in every application of interest. Processing voluminous datasets is highly computation intensive. Parallel...
The English Parliaments of Henry VII 1485-1504 (Oxford Historical Monographs)
The English Parliaments of Henry VII 1485-1504 (Oxford Historical Monographs)

Paul Cavill offers a major reinterpretation of early Tudor constitutional history. In the grand "Whig" tradition, the parliaments of Henry VII were a disappointing retreat from the onward march towards parliamentary democracy. The king was at best indifferent and at worst hostile to parliament; its meetings were cowed and quiescent,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy