Difference between revisions of "Ajax Literature Review"

From OWASP
Jump to: navigation, search
(Articles)
(Articles)
Line 16: Line 16:
 
#[[Ajax and Other "Rich" Interface Technologies]]
 
#[[Ajax and Other "Rich" Interface Technologies]]
 
#[http://www.heise-online.co.uk/security/Ajax-Security-Stronger-than-Dirt--/features/81264 Ajax Security: Stronger than Dirt?]
 
#[http://www.heise-online.co.uk/security/Ajax-Security-Stronger-than-Dirt--/features/81264 Ajax Security: Stronger than Dirt?]
 +
#[http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf Subverting Ajax]
  
 
==Presentations==
 
==Presentations==

Revision as of 13:01, 5 March 2008

link title


Books

  1. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
  2. Ajax Security

Articles

  1. Top 10 Ajax applications
  2. Top 10 Ajax application Part 2
  3. Premature Ajax-ulation
  4. AJAX Security
  5. Top Ten Ajax Vulnerabilities
  6. New chapter and verse on AJAX security
  7. Helping AJAX developers stay ahead of bad guys
  8. Ajax and Other "Rich" Interface Technologies
  9. Ajax Security: Stronger than Dirt?
  10. Subverting Ajax

Presentations

  1. Ajax Security Concerns
  2. Why AJAX Applications Are More Likely to Be Insecure (And What To Do About It)