Securing Your Web Application Against Attacks
In this article we will continue our discussion of authentication and how it helps in securing web applications. You will probably recall from the last article that I mentioned the existence of two methods of authentication and discussed the first one which is through an HTML form. In this article the fifth one in an eight-part series we ll start with the second method of authentication. We ll also discuss how attackers may gain access to your system….
The All-New Adobe Creative Suite 4 Now Shipping: Adobe CS4: tools to help students express their ideas in video, on the web, or print.