Difference between revisions of "Ajax Literature Review"

From OWASP
Jump to: navigation, search
(Articles)
(Articles)
Line 11: Line 11:
 
#[http://searchappsecurity.techtarget.com/qna/0,289202,sid92_gci1197576,00.html New chapter and verse on AJAX security]
 
#[http://searchappsecurity.techtarget.com/qna/0,289202,sid92_gci1197576,00.html New chapter and verse on AJAX security]
 
#[http://searchappsecurity.techtarget.com/qna/0,289202,sid92_gci1198071,00.html?asrc=SS_CLA_302559&psrc=CLT_92 Helping AJAX developers stay ahead of bad guys]
 
#[http://searchappsecurity.techtarget.com/qna/0,289202,sid92_gci1198071,00.html?asrc=SS_CLA_302559&psrc=CLT_92 Helping AJAX developers stay ahead of bad guys]
 +
#[[Ajax and Other "Rich" Interface Technologies]]
  
 
==Presentations==
 
==Presentations==

Revision as of 15:41, 23 August 2007


Books

  1. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
  2. Ajax Security

Articles

  1. AJAX Security
  2. Top Ten Ajax Vulnerabilities
  3. New chapter and verse on AJAX security
  4. Helping AJAX developers stay ahead of bad guys
  5. Ajax and Other "Rich" Interface Technologies

Presentations

  1. Ajax Security Concerns