Book Excerpt: Advanced AJAX: Architecture and Best Practices

Book Excerpt: Advanced AJAX: Architecture and Best Practices

he book Advanced Ajax: Architecture and Best Practices is the definitive guide to building business-critical, production-quality web applications with AJAX. It systematically addresses the design, architecture, and development issues associated with AJAX, offering proven patterns and robust code examples. You’ll find best practices for addressing the full spectrum of issues that enterprise AJAX developers face: scalability, performance, security, reliability, flexibility, maintainability, and reusability.

Writing for experienced web developers, the author delivers fresh ideas and elegant solutions through meaty technical content that is presented with exceptional clarity. Many topics are covered in unprecedented depth including cleanly implementing JavaScript custom events to reduce coupling and to enhance flexibility, overcoming AJAX’s traditional accessibility limitations, reducing network latency through compression and other techniques, and much more. Coverage also includes planning AJAX interfaces for simplicity, clarity, and intuitiveness; creating scalable, maintainable architectures for client-side JavaScript; using tools to profile, validate, and debug client-side code; architecting the server side for security and functionality, while restricting loaded data, objects, and actions to current requests; protecting against widespread and significant AJAX security risks; optimizing every component of an AJAX application, from server-side scripts to database interactions; and introducing cutting-edge AJAX in game development, AJAX with canvas, and AJAX for enterprise applications.

The “Scalable, Maintainable AJAX” sample chapter takes a look at the impact that an implemented architecture has on scalability and what the development team needs to consider to drive scalability, which will keep the application solid. The chapter also discusses how similar techniques can be employed to achieve maintainability, enabling both scalability and maintainability considerations to begin during the design phase. General coding practices are provided to prevent smaller pieces of the application from becoming sluggish when under more demanding circumstances. Primary topics in this area include processor and memory usage; working with multiple interfaces through modularity and late loading; and achieving scalability and maintainability when working with denser rich interfaces.

Download this sample chapter in PDF format (898 KB).

Reproduced from Advanced AJAX: Architecture and Best Practices by permission of Prentice Hall PTR. ISBN-13: 9780131350649/ISBN-10: 0131350641, copyright 2008 Pearson Education Inc. All rights reserved.

Share the Post:
XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved

AI is revolutionizing fraud detection

How AI is Revolutionizing Fraud Detection

Artificial intelligence – commonly known as AI – means a form of technology with multiple uses. As a result, it has become extremely valuable to a number of businesses across

AI innovation

Companies Leading AI Innovation in 2023

Artificial intelligence (AI) has been transforming industries and revolutionizing business operations. AI’s potential to enhance efficiency and productivity has become crucial to many businesses. As we move into 2023, several

data fivetran pricing

Fivetran Pricing Explained

One of the biggest trends of the 21st century is the massive surge in analytics. Analytics is the process of utilizing data to drive future decision-making. With so much of

kubernetes logging

Kubernetes Logging: What You Need to Know

Kubernetes from Google is one of the most popular open-source and free container management solutions made to make managing and deploying applications easier. It has a solid architecture that makes

ransomware cyber attack

Why Is Ransomware Such a Major Threat?

One of the most significant cyber threats faced by modern organizations is a ransomware attack. Ransomware attacks have grown in both sophistication and frequency over the past few years, forcing

data dictionary

Tools You Need to Make a Data Dictionary

Data dictionaries are crucial for organizations of all sizes that deal with large amounts of data. they are centralized repositories of all the data in organizations, including metadata such as