AbstractThe focus is set on the browser as the main source of information risk due to the access provided to the web users. This section assesses the practical arrangements for a secured Internet connection - secure socket layer, avoiding practices like spoofing and phishing with Java script, digital signature authentication technology for ActiveX. Finally it describes configuration techniques for safe use of the PHP language and ends with an example code to counter attacks of SQL Injection.
Download InfoTo our knowledge, this item is not available for download. To find whether it is available, there are three options:
1. Check below under "Related research" whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a search for a similarly titled item that would be available.
Bibliographic InfoPaper provided by Osterreichish-Rumanischer Akademischer Verein in its series Papers with number 2009/53.
Length: 10 pages
Date of creation: 01 Jul 2009
Date of revision:
buffer overflow; hacking; digital signature; spoofing; SQL injection;
Find related papers by JEL classification:
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
This paper has been announced in the following NEP Reports:
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Brindusa Covaci).
If references are entirely missing, you can add them using this form.