Ch. 1. Introduction to Ajax Security -- Ch. 2. The Heist -- Ch. 3. Web Attacks -- Ch. 4. Ajax Attack Surface -- Ch. 5. Ajax Code Complexity -- Ch. 6. Transparency in Ajax Applications -- Ch. 7. Hijacking Ajax Applications -- Ch. 8. Attacking Client-Side Storage -- Ch. 9. Offline Ajax Applications -- Ch. 10. Request Origin Issues -- Ch. 11. Web Mashups and Aggregators -- Ch. 12. Attacking the Presentation Layer -- Ch. 13. JavaScript Worms -- Ch. 14. Testing Ajax Applications -- Ch. 15. Analysis of Ajax Frameworks -- App. A. Samy Source Code -- App. B. Source Code for Yamanner Worm
Notes
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Print version record
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL