Ajax in Action -- Chapter 7, Security and Ajax

David Crane, Eric Pascarello and Darren James

As a registered member of SearchAppSecurity.com, you're entitled to a complimentary copy of Chapter 7 of Ajax in Action written by David Crane, Eric Pascarello and Darren James and published by Manning Publications. "Security and Ajax

    Requires Free Membership to View

" looks at the issue of security in Ajax from a number of angles. Ajax is a Web technology and many of the issues that it faces are no different from any other Web app.

This chapter covers the basic ground, concentrating on Ajax-specific issues such as securely importing generated JavaScript from the server, and protecting your Web service entry points from unwanted direct manipulation. Security can be a showstopper for serious applications, and "Security and Ajax" gives the basic steps needed to keep it under control.


Book description:
Web users are getting tired of the traditional Web experience. They get frustrated losing their scroll position; they get annoyed waiting for refresh; they struggle to reorient themselves on every new page. With asynchronous JavaScript and XML, known as "Ajax," you can give them a better experience. Once users have experienced an Ajax interface, they hate to go back. Ajax is new way of thinking that can result in a flowing and intuitive interaction with the user.

Ajax in Action helps you implement that thinking--it explains how to distribute the application between the client and the server while retaining the integrity of the system. You will learn how to ensure your app is flexible and maintainable, and how good, structured design can help avoid problems like browser incompatibilities. Along the way it helps you unlearn many old coding habits. Above all, it opens your mind to the many advantages gained by placing much of the processing in the browser. If you are a Web developer who has prior experience with Web technologies, this book is for you.

>> Click here to view Chapter 7: Security and Ajax

>> Buy the book



This was first published in August 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.