AJAX - The Complete Reference
PART II Chapter 6: Networking Considerations 281 more continuous connection by modifying the communications style from a pull/po ...
This page intentionally left blank ...
7 Security Concerns T he Internet can be a hostile place. There is no telling what the intentions of visitors to your site or ap ...
284 Part II: Developing an Ajax Library^ reasons, from monitoring data flows to observing trends to eavesdropping and looking fo ...
PART II Chapter 7: Security Concerns 285 Web Application Reconnaissance Review To improve an application’s security posture, the ...
286 Part II: Developing an Ajax Library^ What They Want to Know Why They Want to Know It How They Determine It Possible Counterm ...
PART II Chapter 7: Security Concerns 287 Web Application Attack Review Eventually, whether careful reconnaissance is performed o ...
288 Part II: Developing an Ajax Library^ <input type="password" name="userpass" size="10" maxlength="10" /><br /> &l ...
PART II Chapter 7: Security Concerns 289 /actions/dologin, could it accept a GET query string as well? They might try to see if ...
290 Part II: Developing an Ajax Library^ Attack Name Goal How It Is Performed Possible Countermeasures Field manipulation To cha ...
PART II Chapter 7: Security Concerns 291 desires to gain access to authenticated accounts or administrator features, so here we ...
292 Part II: Developing an Ajax Library^ Attack Name Goal How It Is Performed Possible Countermeasures Phishing / false login To ...
PART II Chapter 7: Security Concerns 293 Ajax Security Differences How much does Ajax change any of the previous discussion of W ...
294 Part II: Developing an Ajax Library^ between back-end, front-end, and network workers that lead to misunderstandings and ove ...
PART II Chapter 7: Security Concerns 295 end user has the code and if their desire, patience, and skills are high enough, they c ...
296 Part II: Developing an Ajax Library^ Going further and replacing variable names and remapping existing objects, the code can ...
PART II Chapter 7: Security Concerns 297 It is pretty clear what is happening here and, while it looks nasty, this layer of prot ...
298 Part II: Developing an Ajax Library^ Yet despite all this, we are convinced that if you are at all interested in improving y ...
PART II Chapter 7: Security Concerns 299 using HTTP either loaded in another window or requested via an XHR. Different directori ...
300 Part II: Developing an Ajax Library^ Exceptions to the Same-Origin Policy Modern browsers enforce the same-origin policy on ...
«
11
12
13
14
15
16
17
18
19
20
»
Free download pdf