December 2003
Intermediate to advanced
504 pages
10h 42m
English
Security of the application is probably one of the most important requirements for development and deployment. In this network-computing age in which servers are really accessible beyond a certain set of users (or beyond the company's own private networks), ensuring secure access to applications is the topmost concern of IT administrators.
A combination of various security methods is used to ensure secure access to an application. This includes basic physical security (typically of the servers hosting the application), authentication (to ensure that the right user has access), authorization (to ensure that the user has the appropriate level of privileges), communication channel and data encryption, and code access security—all applied ...