Monday, February 2, 2009

Ajax or Securing Web Services with WS Security


Author: Thomas A Powell

Build, manage, and secure AJAX applications 

Here is a practical and comprehensive programming guide to AJAX (Asynchronous JavaScript and XML)--the revolutionary new technique for creating interactive Web applications. You will get thorough coverage of AJAX technologies, the advanced JavaScript necessary to use AJAX properly, and how AJAX works with PHP, ASP.NET, JSP, and Ruby. Core information about network, data, and user interface design in support of AJAX is also included.

Table of Contents:

Core Ideas

Introduction to Ajax

Traditional JavaScript Remoting

XMLHttpRequest Object

Data Formats

Applied Ajax

Developing an Ajax Library

Network Considerations

Security Concerns

User Interface Design

Application and Site Architecture

Advanced Topics

Web Services and Beyond


Appendix A: Core JavaScript Quick Reference

Appendix B: HTTP 1.1 Reference

New interesting textbook: Análisis Microeconómico

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

Author: Jothy Rosenberg

You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security -- but how do you combine them in working applications?

Securing Web Services with WS-Security will help you take your Web services securely to production, with insight into the latest security standards.

Jothy Rosenberg and David Remy, both business, technology, and security visionaries, demystify these standards with practical examples including a fully developed case study application showing these tools at work. A pragmatic approach is taken showing which Web Services Security standards are needed when faced with a variety of security challenges. The authors understand that security remains one of the largest remaining impediments to deploying major Web services in business-critical situations. The goal of this book is to remove those impediments by providing a detailed understanding of all the available security technologies and how and when to employ them.

No comments:

Post a Comment