O'Reilly logo

Ajax Security by Bryan Sullivan, Billy Hoffman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5Ajax Code Complexity

Myth: Ajax functionality can be “sprinkled” onto an application simply and without security implications.

Ajax applications may seem simple from a user’s perspective, but under the covers they are fairly complex beasts. They rely on multiple client-side technologies, such as HTML, XML, and JavaScript, all working in harmony. They may also rely on the client-side technologies working in harmony with various server-side technologies, such as Microsoft .NET, Java EE, PHP, or Perl. Most organizations want their Ajax applications to be just as available as their other Web applications. Many organizations have requirements that any user should be able to access the company’s implementation of Ajax applications, whether they are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required