Ajax
Author: Thomas A Powell
Build, manage, and secure AJAX applications
Here is a practical and comprehensive programming guide to AJAX (Asynchronous JavaScript and XML)--the revolutionary new technique for creating interactive Web applications. You will get thorough coverage of AJAX technologies, the advanced JavaScript necessary to use AJAX properly, and how AJAX works with PHP, ASP.NET, JSP, and Ruby. Core information about network, data, and user interface design in support of AJAX is also included.
Table of Contents:
Core Ideas
Introduction to Ajax
Traditional JavaScript Remoting
XMLHttpRequest Object
Data Formats
Applied Ajax
Developing an Ajax Library
Network Considerations
Security Concerns
User Interface Design
Application and Site Architecture
Advanced Topics
Web Services and Beyond
Appendices
Appendix A: Core JavaScript Quick Reference
Appendix B: HTTP 1.1 Reference
New interesting textbook: Análisis Microeconómico
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Author: Jothy Rosenberg
You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security -- but how do you combine them in working applications?
Securing Web Services with WS-Security will help you take your Web services securely to production, with insight into the latest security standards.
Jothy Rosenberg and David Remy, both business, technology, and security visionaries, demystify these standards with practical examples including a fully developed case study application showing these tools at work. A pragmatic approach is taken showing which Web Services Security standards are needed when faced with a variety of security challenges. The authors understand that security remains one of the largest remaining impediments to deploying major Web services in business-critical situations. The goal of this book is to remove those impediments by providing a detailed understanding of all the available security technologies and how and when to employ them.
No comments:
Post a Comment