dcsimg
Login | Register   
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX

By submitting your information, you agree that devx.com may send you DevX offers via email, phone and text message, as well as email offers about other products and services that DevX believes may be of interest to you. DevX will process your information in accordance with the Quinstreet Privacy Policy.


advertisement

More articles by Stephen Maryka

Author Bio
Stephen Maryka, Chief Technical Officer at ICEsoft Technologies Inc., leads the development of all AJAX-based technologies. He is responsible for ICEfaces product development and all AJAX-related R&D.
For Security Zone | January 19, 2007
Developing enterprise AJAX applications can raise security concerns. By applying server-centric approaches that leverage the inherent security of Java and JavaServer Faces, you can deliver AJAX-enriched presentation to the client, but restrict the client's role to just that—presentation.
Sitemap
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.
Thanks for your registration, follow us on our social networks to keep up-to-date