Writing a Secure Application
In the preceding part of this chapter, we’ve surveyed a number of security problems and discussed techniques for dealing with them. In this section, we’ll write an application that uses several of these methods to show how they apply in practice. The basic scenario is somewhat like one of those presented in Chapter 7, “Performing Searches,” where we wrote a couple of applications to display a staff directory consisting of records that describe individual staff members. The primary focus for those applications was on the presentation of read-only information from the directory. Here, we’ll use a similar table that contains information about the people listed in it, but we’ll be more concerned about providing write ...
Get MySQL and Perl for the Web now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.