Click here to Skip to main content
12,955,170 members (59,216 online)
Click here to Skip to main content

Tagged as


2 bookmarked
Posted 24 Jan 2013

Other People’s Data, Your Security: Mashup Applications for Enterprises, Part 2

, 24 Jan 2013 CPOL
In the first article in this series, I covered cross-origin resource sharing (CORS) and building iframe sandboxes and described how to use these techniques in mashup applications to consume data from other domains and provide a layer to a defense-in-depth strategy.

Editorial Note

This article is for our sponsors at CodeProject. These articles are intended to provide you with information on products and services that we consider useful and of value to developers



Compare Revision Minor Date Status Editor
3 - publicly available No 9-Jun-14 6:29 Available Sean Ewington
Updates in content. Changes: 182
2 No 24-Jan-13 5:14 Available Sean Ewington
Updates in content.
1 No 23-Jan-13 11:36 InReview Sean Ewington
Initial creation


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Author

HTML5 Partners
United States United States
No Biography provided

You may also be interested in...

Permalink | Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.170525.1 | Last Updated 24 Jan 2013
Article Copyright 2013 by HTML5 Partners
Everything else Copyright © CodeProject, 1999-2017
Layout: fixed | fluid