Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 47,84
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: California Books, Miami, FL, U.S.A.
EUR 52,05
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 48,46
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 107,15
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Like New. Like New. book.
Da: moluna, Greven, Germania
EUR 39,24
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Raffer GeorgBeing active in the Internet business since 2001, my professionalninterests are focused on development and design of securenenterprise applications based on Java technology. After finishingnmy INFORMATION MANAGEMENT studi.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 52,82
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 50,33
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 49,59
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Unfortunately, while AJAX incorporates the bestcapabilities of both thick-client and thin-clientarchitectures, it is vulnerable to the same attacksthat affect both types of applications. Thick-clientapplications are insecure because they could bedecompiled and analyzed by an attacker. The sameproblem exists with AJAX applications - in fact evenmore so, because in most cases the attacker does noteven need to go to the effort of decompiling theprogram. Knowing the attack surface and thearchitectural weakness of a chosen AJAX frameworklays the foundation for a software architect todesign and develop secure and enterprise-ready AJAXweb applications. This paper does not only discussgeneral vulnerabilities of AJAX-based webapplications, but reflects these in a real-worldexample showing the attack surface for applicationsbuilt with state-of-the-art AJAX frameworks likeJBoss Seam and Google Web Toolkit. The findings ofthis paper help software architects and developers toget a practical understanding of potential attacks.They are a contribution to increase the security ofweb applications.