P A R T 3

Practicing Secure Operations
In Part 2, we discussed creating scripts that are inherently as secure as they can be. Now in Part 3, we turn to the various components that contribute to making your applications secure. In this section, we'll discuss the following issues:
- Making sure that your users are humans and not robots, in Chapter 9
- Identifying those users as precisely as possible, specifying what those users can do in your application, and auditing what those users are doing in Chapter 10
- Preventing data loss, in Chapter 11
- Executing privileged scripts and handling remote procedure calls safely, in Chapter 12