Difference between revisions of "Ajax Literature Review"

From OWASP
Jump to: navigation, search
(Articles)
Line 7: Line 7:
  
 
==Articles==
 
==Articles==
 +
#[http://www.aventureforth.com/2005/09/06/top-10-ajax-applications/] Top 10 Ajax Applications by Dan Grossman
 
#[http://www.cbronline.com/article_news.asp?guid=269108A6-C941-42BA-90C5-217AAF282396 Premature Ajax-ulation]
 
#[http://www.cbronline.com/article_news.asp?guid=269108A6-C941-42BA-90C5-217AAF282396 Premature Ajax-ulation]
 
#[http://www.it-observer.com/articles/1062/ajax_security/ AJAX Security]
 
#[http://www.it-observer.com/articles/1062/ajax_security/ AJAX Security]

Revision as of 11:00, 28 February 2008


Books

  1. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
  2. Ajax Security

Articles

  1. [1] Top 10 Ajax Applications by Dan Grossman
  2. Premature Ajax-ulation
  3. AJAX Security
  4. Top Ten Ajax Vulnerabilities
  5. New chapter and verse on AJAX security
  6. Helping AJAX developers stay ahead of bad guys
  7. Ajax and Other "Rich" Interface Technologies

Presentations

  1. Ajax Security Concerns
  2. Why AJAX Applications Are More Likely to Be Insecure (And What To Do About It)