August 2018
Intermediate to advanced
298 pages
5h 33m
English
We can never rely on the data entered by users. Sometimes they might be ignorant about the application and thus they may be entering incorrect data unknowingly. At other times, some malign users may want to corrupt the application by entering inappropriate data into it. In either case, we need to validate the input data before storing the data for further processing.
By the end of this chapter, you will be able to:
Read now
Unlock full access