Monday, February 2, 2009

Ajax or Securing Web Services with WS Security

Ajax

Author: Thomas A Powell

Build, manage, and secure AJAX applications 

Here is a practical and comprehensive programming guide to AJAX (Asynchronous JavaScript and XML)--the revolutionary new technique for creating interactive Web applications. You will get thorough coverage of AJAX technologies, the advanced JavaScript necessary to use AJAX properly, and how AJAX works with PHP, ASP.NET, JSP, and Ruby. Core information about network, data, and user interface design in support of AJAX is also included.



Table of Contents:

Core Ideas


Introduction to Ajax


Traditional JavaScript Remoting


XMLHttpRequest Object


Data Formats


Applied Ajax


Developing an Ajax Library


Network Considerations


Security Concerns


User Interface Design


Application and Site Architecture


Advanced Topics


Web Services and Beyond


Appendices


Appendix A: Core JavaScript Quick Reference


Appendix B: HTTP 1.1 Reference


New interesting textbook: Análisis Microeconómico

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

Author: Jothy Rosenberg

You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security -- but how do you combine them in working applications?

Securing Web Services with WS-Security will help you take your Web services securely to production, with insight into the latest security standards.

Jothy Rosenberg and David Remy, both business, technology, and security visionaries, demystify these standards with practical examples including a fully developed case study application showing these tools at work. A pragmatic approach is taken showing which Web Services Security standards are needed when faced with a variety of security challenges. The authors understand that security remains one of the largest remaining impediments to deploying major Web services in business-critical situations. The goal of this book is to remove those impediments by providing a detailed understanding of all the available security technologies and how and when to employ them.



No comments:

Post a Comment