December 2011
Beginner
384 pages
9h 38m
English
We’ll Cover
Defining the same-origin policy
Exceptions to the same-origin policy
Many of the security principles we’ve talked about and will talk about in this book deal with protecting your server resources. You want to be sure that unauthorized users can’t access the system; you want to be sure that attackers can’t break into your databases and steal your data; you want to be sure that no one can slow your system down so that it’s unavailable for everyone else. And it’s vital that you ...