Description: There is no inherent security weakness in Ajax but adaptation of this technology vector has
changed the Web application development approach and methodology significantly. Data and
object serialization was very difficult in the old days when DCOM and CORBA formed the core
middleware tier. Ajax can consume XML, HTML, JS Array, JSON, JS Objects and other
customized objects using simple GET, POST or SOAP calls all this without invoking any
middleware tier.
To Search:
File list (Check if you may need any files):
Ajax-top10security.pdf