Build extra secure Web applications
Data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code. To satisfy this requirement, This article offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).
(Submitted by Anonymous Wed Nov 9, 2005 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author