Web Application Technologies
Web applications employ a myriad of different technologies to implement their functionality. This article contains a short primer on the
Read moreWeb applications employ a myriad of different technologies to implement their functionality. This article contains a short primer on the
Read moreAny useful application needs to be managed and administered, and this facility often forms a key part of the application’s
Read moreAnyone designing an application for which security is remotely important must work on the assumption that it will be directly
Read moreRecall the fundamental security problem described in Chapter 1: all user input is untrusted. A huge variety of different attacks
Read moreA central security requirement that virtually any application needs to meet is to control users’ access to its data and
Read moreThe fundamental security problem with web applications — that all user input is untrusted — gives rise to a number
Read moreSeveral years after their widespread adoption, web applications on the Internet today are still rife with vulnerabilities. Understanding of the
Read moreAs with any new class of technology, web applications have brought with them a new range of security vulnerabilities. The
Read moreIn the early days of the Internet, the World Wide Web consisted only of web sites. These were essentially information
Read moreVersion Numbering Before digging into programming, we’d like to comment on the version numbering scheme used in Linux and which
Read more