Book Description




Chums


Book Description




Histories of the Unexpected: The Tudors


Book Description

Histories of the Unexpected not only presents a new way of thinking about the past, but also reveals the world around us as never before. Traditionally, the Tudors have been understood in a straightforward way but the period really comes alive if you take an unexpected approach to its history. Yes, Tudor monarchs, exploration and religion have a fascinating history... but so too does cannibalism, shrinking, bells, hats, mirrors, monsters, faces, letter-writing and accidents! Each of these subjects is equally fascinating in its own right, and each sheds new light on the traditional subjects and themes that we think we know so well.







Securing Ajax Applications


Book Description

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur. Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your customers. This book presents basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies -- vital information that will ultimately save you time and money. Topics include: An overview of the evolving web platform, including APIs, feeds, web services and asynchronous messaging Web security basics, including common vulnerabilities, common cures, state management and session management How to secure web technologies, such as Ajax, JavaScript, Java applets, Active X controls, plug-ins, Flash and Flex How to protect your server, including front-line defense, dealing with application servers, PHP and scripting Vulnerabilities among web standards such as HTTP, XML, JSON, RSS, ATOM, REST, and XDOS How to secure web services, build secure APIs, and make open mashups secure Securing Ajax Applications takes on the challenges created by this new generation of web development, and demonstrates why web security isn't just for administrators and back-end programmers any more. It's also for web developers who accept the responsibility that comes with using the new wonders of the Web.




Histories of the Unexpected: The Vikings


Book Description

Histories of the Unexpected not only presents a new way of thinking about the past, but also reveals the world around us as never before. Traditionally, the Vikings have been understood in a straightforward way - but the period really comes alive if you take an unexpected approach to its history. Yes, ships, raiding and trade have a fascinating history... but so too do hair, break-ins, toys, teeth, mischief, luck and silk! Each of these subjects is equally fascinating in its own right, and each sheds new light on the traditional subjects and themes that we think we know so well.




Histories of the Unexpected: The Romans


Book Description

Histories of the Unexpected not only presents a new way of thinking about the past, but also reveals the world around us as never before. Traditionally, the Romans have been understood in a straightforward way but the period really comes alive if you take an unexpected approach to its history. Yes, emperors, the development of civilisation and armies all have a fascinating history... but so too do tattoos, collecting, fattening, recycling, walking, poison, fish, inkwells and wicked stepmothers! Each of these subjects is equally fascinating in its own right, and each sheds new light on the traditional subjects and themes that we think we know so well.




The Business Library


Book Description




Technical Reports


Book Description




The ATO Palm


Book Description