Click here to Skip to main content
12,397,102 members (68,812 online)
Click here to Skip to main content

Tagged as

Stats

7.8K views
3 bookmarked
Posted

Other People’s Data, Your Security: Mashup Applications for Enterprises, Part 2

, 24 Jan 2013 CPOL
In the first article in this series, I covered cross-origin resource sharing (CORS) and building iframe sandboxes and described how to use these techniques in mashup applications to consume data from other domains and provide a layer to a defense-in-depth strategy.

Editorial Note

This article is for our sponsors at CodeProject. These articles are intended to provide you with information on products and services that we consider useful and of value to developers

Revisions


  

Compare Revision Minor Date Status Editor
3 - publicly available No 9-Jun-14 12:29 Available Sean Ewington
Updates in content. Changes: 182
2 No 24-Jan-13 11:14 Available Sean Ewington
Updates in content.
1 No 23-Jan-13 17:36 InReview Sean Ewington
Initial creation

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

HTML5 Partners
United States United States
No Biography provided

You may also be interested in...

| Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.160721.1 | Last Updated 24 Jan 2013
Article Copyright 2013 by HTML5 Partners
Everything else Copyright © CodeProject, 1999-2016
Layout: fixed | fluid