Build extra secure Web applications

Posted by VISITOR on Nov 8, 2005 9:41 PM CST
developerWorks; By IBM
Mail this story
Print this story

Data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code. To satisfy this requirement, This article offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).

Data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code. To satisfy this requirement, This article offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).

Full Story

  Nav
» Read more about: Story Type: News Story; Groups:

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.