Difference between revisions of "Ajax Literature Review"

From OWASP
Jump to: navigation, search
(Articles)
Line 1: Line 1:
__NOTOC__
+
[http://www.example.com link title]__NOTOC__
  
  
Line 7: Line 7:
  
 
==Articles==
 
==Articles==
#[http://www.aventureforth.com/2005/09/06/top-10-ajax-applications]  
+
#[http://www.aventureforth.com/2005/09/06/top-10-ajax-applications Top 10 Ajax applications]
 +
#[http://www.aventureforth.com/2005/09/16/top-10-ajax-applications-part-2/ Top 10 Ajax application Part 2]
 
#[http://www.cbronline.com/article_news.asp?guid=269108A6-C941-42BA-90C5-217AAF282396 Premature Ajax-ulation]
 
#[http://www.cbronline.com/article_news.asp?guid=269108A6-C941-42BA-90C5-217AAF282396 Premature Ajax-ulation]
 
#[http://www.it-observer.com/articles/1062/ajax_security/ AJAX Security]
 
#[http://www.it-observer.com/articles/1062/ajax_security/ AJAX Security]

Revision as of 14:33, 28 February 2008

link title


Books

  1. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
  2. Ajax Security

Articles

  1. Top 10 Ajax applications
  2. Top 10 Ajax application Part 2
  3. Premature Ajax-ulation
  4. AJAX Security
  5. Top Ten Ajax Vulnerabilities
  6. New chapter and verse on AJAX security
  7. Helping AJAX developers stay ahead of bad guys
  8. Ajax and Other "Rich" Interface Technologies

Presentations

  1. Ajax Security Concerns
  2. Why AJAX Applications Are More Likely to Be Insecure (And What To Do About It)