Book Image

Oracle JET for Developers

By : Raja Malleswara Rao Malleswara Rao Pattamsetti
Book Image

Oracle JET for Developers

By: Raja Malleswara Rao Malleswara Rao Pattamsetti

Overview of this book

This book will give you a complete practical understanding of the Oracle JavaScript Extension Toolkit (JET) and how you can use it to develop efficient client-side applications with ease. It will tell you how to get your own customized Oracle JET set up. You'll start with individual libraries, such as jQuery, Cordova, and Require.js. You'll also get to work with the JavaScript libraries created by Oracle, especially for cloud developers. You'll use these tools to create a working backend application with these libraries. Using the latest Oracle Alta UI, you'll develop a state-of-the-art backend for your cloud applications. You'll learn how to develop and integrate the different cloud services required for your application and use other third-party libraries to get more features from your cloud applications. Toward the end of the book, you'll learn how to manage and secure your cloud applications, and test them to ensure seamless deployment.
Table of Contents (17 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Common web application vulnerabilities


Application developers should be aware of the security guidelines and follow the standards to ensure they build a secure web application. Web application vulnerabilities are some of the commonly occurring mistakes in application development, and can lead to data breach in our applications and can compromise our applications' security. There are a number of software solutions (such as CheckMarx) available to determine security violations in applications via a software scan, and to fix the problems. Let us review the most common web application vulnerabilities in the upcoming sections.

Cross-Site Scripting (XSS)

An XSS vulnerability occurs due to insufficient client-side validation on web pages if the web pages load the data from users and include this in web pages without validating the data. This lets the hacker’s script execute on a victim's browser and show arbitrary content, that the victim believes is real and from the application, and so he provides...