Ajax Security

来源:互联网 发布:java实现推荐算法 编辑:程序博客网 时间:2024/04/30 19:02
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications arent designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge thats been virtually impossible to find, until now.

Ajax Security systematically debunks todays most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpaces Samy worm to MacWorlds conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. Youll learn how to:

*Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic
*Write new Ajax code more safelyand identify and fix flaws in existing code
*Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft
*Avoid attacks based on XSS and SQL Injectionincluding a dangerous SQL Injection variant that can extract an entire backend database with just two requests
*Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensionsand recognize what you still must implement on your own
*Create more secure mashup applications

Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.


http://rapidshare.com/files/98616958/0321491939.zip
http://depositfiles.com/files/4050134
原创粉丝点击