32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
16 °P sammeln
  • Broschiertes Buch

Unfortunately, while AJAX incorporates the best capabilities of both thick-client and thin-client architectures, it is vulnerable to the same attacks that affect both types of applications. Thick-client applications are insecure because they could be decompiled and analyzed by an attacker. The same problem exists with AJAX applications - in fact even more so, because in most cases the attacker does not even need to go to the effort of decompiling the program. Knowing the attack surface and the architectural weakness of a chosen AJAX framework lays the foundation for a software architect to…mehr

Produktbeschreibung
Unfortunately, while AJAX incorporates the best
capabilities of both thick-client and thin-client
architectures, it is vulnerable to the same attacks
that affect both types of applications. Thick-client
applications are insecure because they could be
decompiled and analyzed by an attacker. The same
problem exists with AJAX applications - in fact even
more so, because in most cases the attacker does not
even need to go to the effort of decompiling the
program. Knowing the attack surface and the
architectural weakness of a chosen AJAX framework
lays the foundation for a software architect to
design and develop secure and enterprise-ready AJAX
web applications. This paper does not only discuss
general vulnerabilities of AJAX-based web
applications, but reflects these in a real-world
example showing the attack surface for applications
built with state-of-the-art AJAX frameworks like
JBoss Seam and Google Web Toolkit. The findings of
this paper help software architects and developers to
get a practical understanding of potential attacks.
They are a contribution to increase the security of
web applications.
Autorenporträt
Being active in the Internet business since 2001, my professional
interests are focused on development and design of secure
enterprise applications based on Java technology. After finishing
my INFORMATION MANAGEMENT studies in 1999 I continued to focus on
security relevant topics and finished my second studies ADVANCED
SECURITY ENGINEERING in 2008.