December 2010
Intermediate to advanced
363 pages
12h 21m
English
In this chapter, we have looked at ways to provide authentication systems, access control systems, and logging systems to make sure your applications are being used by the right users in the right way.
In the next chapter, we will continue our analysis of secure operations, by discussing ways that you can effectively prevent the loss of data from your databases.