Advertisement

Abstract

No two applications are exactly alike. Thus, the security required to protect one application is likely different—either vastly or slightly—from that required for any other application. Determining to secure your application starts with a proper assessment of the risk posed and corresponding threats. The upcoming section on “Assessment” goes into detail on how to initiate your thinking about security.

Keywords

Access Control Authorized User Threat Analysis Home Security Project Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Scott Spendolini 2013

Authors and Affiliations

  • Scott Spendolini

There are no affiliations available

Personalised recommendations