Please use this identifier to cite or link to this item: https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6160
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHoffman, Billy-
dc.contributor.authorSullivan, Bryan-
dc.date.accessioned2014-11-05T07:41:17Z-
dc.date.available2014-11-05T07:41:17Z-
dc.date.issued2007-
dc.identifier.issn0-321-49193-9-
dc.identifier.urihttps://thuvienso.dau.edu.vn:88/handle/DHKTDN/6160-
dc.description.abstractTable of contents: Chapter 1. Introduction to Ajax security; Chapter 3. Web attacks; Chapter 4. Ajax attack surface; Chapter 5. Ajax code complexity; Chapter 6. Transparency in Ajax applications; Chapter 7. Hijacking Ajax applications; Chapter 8. Attacking client-side storage; Chapter 9. Offline Ajax applications; Chapter 10. Request origin issues; Chapter 11. Web mashups and aggregators; Chapter 12. Attacking the presentation layer; Chapter 13. JavaScript Worms; Chapter 14. Testing Ajax applications; Chapter 15. Analysis of Ajax frameworks.vi
dc.language.isoenvi
dc.subjectAjax securityvi
dc.subjectHTMLvi
dc.subjectFrameworksvi
dc.titleAjax securityvi
dc.typeBookvi
Appears in Collections:Ngoại Văn

Files in This Item:
File Description SizeFormat 
6469 Ajax security.pdf12.72 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.