JavaScript Security

Купить бумажную книгу и читать

Купить бумажную книгу

По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".

Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.

Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.

Название: Android Application Security Essentials

Издательство: Packt Publishing

Язык: English

Страниц: 113

Год : 2014

ISBN : 978-1783988006

Автор : Y.E Liang

Размер: 2.49 MB

Security issues arise from both server and client weaknesses. In this book, you will

learn the basics of these security weaknesses, how to recognize them, and how to

prevent them.

What this book covers

Chapter 1 , javascript and the Web , provides a broad overview of the role of javascript

in the Web. You will learn that javascript, besides giving behavior to web pages, can

do a lot more today. javascript is now not only used on the client side, but also on

the server side. javascript is almost the de facto standard way to create delightful

experiences on the Web.

Chapter 2 , Secure Ajax RESTful APIs , touches upon using javascript in tandem with

RESTful APIs. We will learn how to make basic GET and POST calls to an endpoint.

Subsequently, we will learn how to make malicious requests. From this chapter, we

will learn more about some specific topics.

Chapter 3 , Cross-site Scripting, explains what cross-site scripting is and helps you

understand how such issues can occur. Most importantly, you will also learn how

to minimize such risks.

Chapter 4 , Cross-site Request Forgery , explains what cross-site forgery is and helps you

understand how such issues can occur. Most importantly, you will also learn how

to minimize such risks.

Chapter 5 , Misplaced Trust in the Client , discusses a broad topic that can take place in

many forms. In general, misplaced trust in the client takes place when the author's

javascript code doesn't work as intended due to malicious actions by an adversary.

Chapter 6 , javascript Phishing, explores the different ways in which javascript can

be used to achieve a malicious end. javascript phishing is usually associated with

online identity theft and privacy intrusion.

Дата создания страницы: