Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
106 Chapter 3 • Understanding the Risks Associated with Mobile Code
human judgment.With this model, a user can be nearly 100-percent
sure that an ActiveX control is coming from the entity that is stated on
the certificate.
To prevent digital forgery, a signing authority is used in conjunction
with the authenticode process to ensure that the person or company on
the certificate is legitimate. As with Java applet signing,VeriSign can act
as the signing company.
With this type of security, a user knows that the control is reasonably
authentic, and not just someone claiming to be Adobe or IBM. He or
she can also be relatively sure that it is not some modification ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312