Build extra secure Web applications

10
Anonymous Reader writes “Data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code. To satisfy this requirement, This article offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).”

Link: ibm.com/developerworks

Category:

  • Web Development