In Brief
Security of the application is probably one of the most important requirements for development and deployment. In this network-computing age in which servers are really accessible beyond a certain set of users (or beyond the company's own private networks), ensuring secure access to applications is the topmost concern of IT administrators.
A combination of various security methods is used to ensure secure access to an application. This includes basic physical security (typically of the servers hosting the application), authentication (to ensure that the right user has access), authorization (to ensure that the user has the appropriate level of privileges), communication channel and data encryption, and code access security—all applied ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access