Pages

Subscribe:

Ads 468x60px

Securing AJAX Applications : PDF bOOk


OReilly Securing AJAX Applications (2007)
by
Christopher Wells

HTTP Transactions
When Jim hooked up with the server using telnet he established a connection to the
server and began initiating an HTTP transaction. Next, he evoked the HTTP GET
command or method followed by the name of the resource that he wanted—in this
case, classic.html. This took the form of a specified Uniform Resource Identifier
(URI), which is a path that the server associates with the location of the desired
resource. Figure 1-1 shows an HTTP request.
Download

No comments:

Post a Comment

Watch Wrestling Live
Watch Rugby Live
Watch Racing Online Watch NFL Live
Watch NFL Live Watch Online TV