November 2017
Intermediate to advanced
542 pages
14h 24m
English
Our primary focus up to this point in the book has been on securing the web-facing portion of the JBCP calendar application; however, in real-world planning of secured systems, equal attention should be paid to securing the service methods that allow users access to the most critical part of any system—its data.
Read now
Unlock full access