Contents of This Book

Chapter 1

Recounts how we got to where we are today on the Web. The chapter explains how web technologies have evolved, and why we have such a tangled Web.

Chapter 2

Describes basic security terms, practices, and methodologies. It also lays out and identifies the major vulnerabilities on the Web today.

Chapter 3

Describes all the different types of web communications. This chapter discusses basic security measures that minimize risk and examines the security of several Internet technologies.

Chapter 4

Walks through setting up a secure web server. It offers practical advice to help protect a server from threats on the Internet.

Chapter 5

Explores the major protocols associated with web applications, where the seams are, what the possible attack vectors might be, and some recommended countermeasures to help make applications more secure.

Chapter 6

Looks at how web services work, the moving parts, how web technologies such as Ajax can fit in, and what major areas require security attention.

Chapter 7

Examines web API design and construction and points out some security pitfalls along the way.

Chapter 8

Discusses the evolution of web APIs and how they work. This chapter also looks at some of the major security issues with mashups, such as lack of trust and authentication. It also tries to answer questions, such as what is the worst that can happen, and how to balance openness and security.

Get Securing Ajax Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.