Paperback: 504 pages
Publisher: Addison-Wesley Professional; 1 edition (December 16, 2007)
Language: English
ISBN-10: 0321491939
ISBN-13: 978-0321491930
Product Dimensions: 6.9 x 1.2 x 9.1 inches
Shipping Weight: 2.2 pounds (View shipping rates and policies)
Average Customer Review: 4.8 out of 5 stars See all reviews (10 customer reviews)
Best Sellers Rank: #2,280,552 in Books (See Top 100 in Books) #26 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > ISDN #72 in Books > Computers & Technology > Programming > Languages & Tools > Ajax #532 in Books > Computers & Technology > Certification > CompTIA
Ajax Security was the last book I read and reviewed in 2007. However, it was the best book I read all year. The book is absolutely compelling and every security professional and Web developer should read it. It's really as simple as that.I am not a Web developer. I was not very familiar with Ajax (beyond its buzzword status and a vague notion of functionality) when I started reading Ajax Security. I attended the authors' Black Hat 2007 talk and was thoroughly impressed and disturbed by the security implications they presented. I expected Ajax Security to be a good book, but one can never be sure if talented hackers and presenters can transfer their skills to the written word. Ajax Security gets the job done.Despite being a traditional network security guy who prefers inspecting traffic to analyzing JavaScript, I had no problem understanding Ajax Security. The authors do a superb job leading the reader through the issues surrounding modern Web applications. They start by introducing a technology, which is critical for someone like me who doesn't deal with Web development issues. Next they describe how it is broken. They continue with defensive recommendations and summarize their findings in the conclusion. This is a perfect technical writing style that is too often lost on other authors.Ajax Security makes very good use of case studies (both large stories like ch 2 and small ones throughout the text). The book also integrates code, diagrams, and screen shots. The text itself is very clear and the authors keep the reader's attention throughout. Histories for various technologies provide a welcome background, showing readers how we've ended up in our current Web 2.0 predicament.
Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Programming ASP.NET AJAX: Build rich, Web 2.0-style UI with ASP.NET AJAX Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Ajax Security Web 2.0 Security - Defending AJAX, RIA, AND SOA Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) CompTIA Security+ Guide to Network Security Fundamentals Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series) Practical UNIX and Internet Security (Computer Security) Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture (Symbian Press) Network Security: Private Communications in a Public World (Radia Perlman Series in Computer Networking and Security)