Skip to Content
Using XML with Legacy Business Applications
book

Using XML with Legacy Business Applications

by Michael C. Rawlins
August 2003
Intermediate to advanced content levelIntermediate to advanced
624 pages
15h 3m
English
Addison-Wesley Professional
Content preview from Using XML with Legacy Business Applications

Dealing with Security

In this chapter we'll deal primarily with security of data while in transit. Security of data within your enterprise is certainly very important, but it can involve fundamentally different problems. The scope is different and the mechanisms to enforce security can be different. Referring to one of my observations above, you want to make sure that your system makes it very difficult for both internal and external hackers to steal sensitive information such as credit card data. The mechanisms for ensuring this type of security often involve firewalls, operating system and file system protections, database security, and individual user authentication. As we'll see, these can be very different from the mechanisms commonly used ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning XML with C# 7: XML Processing and Data Access for C# Developers

Beginning XML with C# 7: XML Processing and Data Access for C# Developers

Bipin Joshi
XML Hacks

XML Hacks

Michael Fitzgerald
XML Unleashed

XML Unleashed

Michael Morrison
XML in a Nutshell, 3rd Edition

XML in a Nutshell, 3rd Edition

Elliotte Rusty Harold, W. Scott Means

Publisher Resources

ISBN: 0321154940Purchase book