Click here to Skip to main content
11,431,373 members (67,693 online)
Click here to Skip to main content
Add your own
alternative version

Tagged as

Other People’s Data, Your Security: Mashup Applications for Enterprises, Part 2

, 24 Jan 2013 CPOL
In the first article in this series, I covered cross-origin resource sharing (CORS) and building iframe sandboxes and described how to use these techniques in mashup applications to consume data from other domains and provide a layer to a defense-in-depth strategy.
No downloads associated with this content

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

HTML5 Partners

United States United States
No Biography provided

| Advertise | Privacy | Terms of Use | Mobile
Web04 | 2.8.150428.2 | Last Updated 24 Jan 2013
Article Copyright 2013 by HTML5 Partners
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid