Indexed Database API 2.0
首页
白天
夜间
下载
阅读记录
书签管理
我的书签
添加书签
移除书签
编辑文档
9. Security Considerations
来源 1
浏览
377
扫码
打印
2020-05-13 07:08:20
上一篇:
下一篇:
发布点评
Indexed Database API 2.0
W3C Recommendation, 30 January 2018
6. Database operations
6.1. Object Store Storage Operation
6.2. Object Store Retrieval Operations
6.3. Index Retrieval Operations
6.4. Object Store Deletion Operation
6.5. Record Counting Operation
6.6. Object Store Clear Operation
6.7. Cursor Iteration Operation
7. ECMAScript binding
7.1. Extract a key from a value
7.2. Inject a key into a value
7.3. Convert a key to a value
7.4. Convert a value to a key
8. Privacy Considerations
8.1. User tracking
8.2. Cookie resurrection
8.3. Sensitivity of data
9. Security Considerations
9.1. DNS spoofing attacks
9.2. Cross-directory attacks
9.3. Implementation risks
9.4. Persistence risks
10. Revision History
11. Acknowledgements
Conformance
Index
References
IDL Index
Abstract
Status of this document
1. Introduction
2. Constructs
2.1. Database
2.10. Cursor
2.11. Key Generators
2.2. Object Store
2.3. Values
2.4. Keys
2.5. Key Path
2.6. Index
2.7. Transactions
2.8. Requests
2.9. Key Range
3. Exceptions
4. API
4.1. The IDBRequest interface
4.2. Event interfaces
4.3. The IDBFactory interface
4.4. The IDBDatabase interface
4.5. The IDBObjectStore interface
4.6. The IDBIndex interface
4.7. The IDBKeyRange interface
4.8. The IDBCursor interface
4.9. The IDBTransaction interface
5. Algorithms
5.1. Opening a database
5.10. Firing an error event
5.11. Clone a value
5.2. Closing a database
5.3. Deleting a database
5.4. Committing a transaction
5.5. Aborting a transaction
5.6. Asynchronously executing a request
5.7. Running an upgrade transaction
5.8. Aborting an upgrade transaction
5.9. Firing a success event
暂无相关搜索结果!
本文档使用
全库网
构建
×
思维导图备注
×
文章二维码
手机扫一扫,轻松掌上读
×
文档下载
请下载您需要的格式的文档,随时随地,享受汲取知识的乐趣!
PDF
文档
EPUB
文档
MOBI
文档
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度