Securing Your Application

  • Chris Anderson


In any business application, securing data and operations appropriately so that only approved users have access should be a significant design factor. Not doing so effectively opens the business to threats from snooping competitors, breaches of privacy laws, and even sabotage. Therefore, designing effective security into your application is extremely important. This generally involves validating users’ identities, tracking them and their assigned roles, and restricting their access to approved data and operations accordingly.


Event Handler Domain Service User Object User Registration Configuration Tool 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Chris Anderson 2012

Authors and Affiliations

  • Chris Anderson

There are no affiliations available

Personalised recommendations