Please use this identifier to cite or link to this item:
https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6160Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Hoffman, Billy | - |
| dc.contributor.author | Sullivan, Bryan | - |
| dc.date.accessioned | 2014-11-05T07:41:17Z | - |
| dc.date.available | 2014-11-05T07:41:17Z | - |
| dc.date.issued | 2007 | - |
| dc.identifier.issn | 0-321-49193-9 | - |
| dc.identifier.uri | https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6160 | - |
| dc.description.abstract | Table of contents: Chapter 1. Introduction to Ajax security; Chapter 3. Web attacks; Chapter 4. Ajax attack surface; Chapter 5. Ajax code complexity; Chapter 6. Transparency in Ajax applications; Chapter 7. Hijacking Ajax applications; Chapter 8. Attacking client-side storage; Chapter 9. Offline Ajax applications; Chapter 10. Request origin issues; Chapter 11. Web mashups and aggregators; Chapter 12. Attacking the presentation layer; Chapter 13. JavaScript Worms; Chapter 14. Testing Ajax applications; Chapter 15. Analysis of Ajax frameworks. | vi |
| dc.language.iso | en | vi |
| dc.subject | Ajax security | vi |
| dc.subject | HTML | vi |
| dc.subject | Frameworks | vi |
| dc.title | Ajax security | vi |
| dc.type | Book | vi |
| Appears in Collections: | Ngoại Văn | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 6469 Ajax security.pdf | 12.72 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
