• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part: 2 Ensuring Security > Understanding Security

Chapter 7. Understanding Security

IN THIS CHAPTER

Security Risks 145

Encryption 147

Browser Validation 167

Authentication and Authorization 173

It is important to understand that security risks are inherent to any application running on a networked machine. This remains true of all Internet applications. The risks do not apply only to the code, database, servers, and infrastructure of the application. The risks are just as real to end users because they often use the applications to enter sensitive information, which then needs to be transmitted back to the servers. In this time of increasing cyber-terrorism, protecting sensitive data should be a chief priority for Web applications.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint