Books Computers & Technology

Web 2.0 Security - Defending AJAX, RIA, AND SOA

5 stars - 1128 reviews / Write a review

Pages: 384

Book format: An electronic version of a printed book that can be read on a computer or handheld device designed specifically for this purpose.

Publisher: Date:12/4/2007 - Charles River Media

By: Shreeraj Shah

Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Although these robust tools make next-generation Web applications possible, they also add new security concerns to the fi eld of Web application security. Yamanner-, Sammy-, and Spaceflash-type worms are exploiting client-side Ajax frameworks, providing new avenues of attack, and compromising confidential information. Portals such as Google, Netflix, Yahoo, and MySpace have witnessed new vulnerabilities recently, and these vulnerabilities can be leveraged by attackers to perform phishing, cross-site scripting (XSS), and cross-site request forgery (CSRF) exploitation. Web 2.0 Security: Defending Ajax, RIA, and SOA covers the new field of Web 2.0 security. Written for security professionals and developers, the book explores Web 2.0 hacking methods and helps enhance next-generation security controls for better application security. Readers will gain knowledge in advanced footprinting and discovery techniques: Web 2.0 scanning and vulnerability detection methods: Ajax and Flash hacking methods: SOAP, REST, and XML-RPC hacking: RSS/Atom feed attacks: fuzzing and code review methodologies and tools: and tool building with Python, Ruby, and .NET. Whether you’re a computer security professional, a developer, or an administrator, Web 2.0 Security: Defending Ajax, RIA, and SOA is the only book you will need to prevent new Web 2.0 security threats from harming your network and compromising your data.  

Read online or download a free book: Web 2.0 Security - Defending AJAX, RIA, AND SOA.pdf

Read online book - Web 2.0 Security - Defending AJAX, RIA, AND SOADownload book - Web 2.0 Security - Defending AJAX, RIA, AND SOA.pdf

The message text:

Other books