Securing Your Web Application Against Attacks
<In this article we will continue our discussion of authentication and how it helps in securing web applications. You will probably recall from the last article that I mentioned the existence of two methods of authentication and discussed the first one which is through an HTML form. In this article the fifth one in an eight-part series we ll start with the second method of authentication. We ll also discuss how attackers may gain access to your system….
The All-New Adobe Creative Suite 4 Now Shipping: Adobe CS4: tools to help students express their ideas in video, on the web, or print.