The focus is set on the browser as the main source of information risk due to the access provided to the web users. This section assesses the practical arrangements for a secured Internet connection - secure socket layer, avoiding practices like spoofing and phishing with Java script, digital signature authentication technology for ActiveX. Finally it describes configuration techniques for safe use of the PHP language and ends with an example code to counter attacks of SQL Injection.
To our knowledge, this item is not available for
download. To find whether it is available, there are three
1. Check below under "Related research" whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a search for a similarly titled item that would be available.
|Date of creation:||01 Jul 2009|
|Date of revision:|
|Contact details of provider:|| Postal: |
Phone: (004021) 455.1000
Fax: (004021) 314.39.08
Web page: http://www.oraverein.tk
More information through EDIRC
When requesting a correction, please mention this item's handle: RePEc:ris:sphedp:2009_053. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Brindusa Covaci)
If references are entirely missing, you can add them using this form.