Writing a Secure Application

In the preceding part of this chapter, we’ve surveyed a number of security problems and discussed techniques for dealing with them. In this section, we’ll write an application that uses several of these methods to show how they apply in practice. The basic scenario is somewhat like one of those presented in Chapter 7, “Performing Searches,” where we wrote a couple of applications to display a staff directory consisting of records that describe individual staff members. The primary focus for those applications was on the presentation of read-only information from the directory. Here, we’ll use a similar table that contains information about the people listed in it, but we’ll be more concerned about providing write ...

Get MySQL and Perl for the Web now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.