Sunday, December 6, 2015
Securing AJAX Applications : PDF bOOk
OReilly Securing AJAX Applications (2007)
by
Christopher Wells
HTTP Transactions
When Jim hooked up with the server using telnet he established a connection to the
server and began initiating an HTTP transaction. Next, he evoked the HTTP GET
command or method followed by the name of the resource that he wanted—in this
case, classic.html. This took the form of a specified Uniform Resource Identifier
(URI), which is a path that the server associates with the location of the desired
resource. Figure 1-1 shows an HTTP request.
Download |
Labels:
AJAX,
AJAX Security,
OREILLY
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.