Securing Your Application

  • Chris Anderson


In any business application, securing data and operations appropriately so that only approved users have access should be a significant design factor. Not doing so effectively opens the business to threats from snooping competitors, breaches of privacy laws, and even sabotage. Therefore, designing effective security into your application is extremely important. This generally involves validating users’ identities, tracking them and their assigned roles, and restricting their access to approved data and operations accordingly.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Chris Anderson 2012

Authors and Affiliations

  • Chris Anderson

There are no affiliations available

Personalised recommendations