No credit card required
What You’ll Learn in This Hour:
How role-based security works
What options are available for you to use when considering your security needs
How to use the FORM authentication method
How to use role-based security programmatically
In Hour 12, “Saving Data Between Requests,” you saw how to create a login form and keep ...