Security Tips"
From Documentation
m |
|||
Line 1: | Line 1: | ||
{{ZKDevelopersReferencePageHeader}} | {{ZKDevelopersReferencePageHeader}} | ||
− | This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report [[Media:ZK_Security_Report.pdf|here]] | + | This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report [[Media:ZK_Security_Report.pdf|here (PDF)]]. |
{{ZKDevelopersReferenceHeadingToc}} | {{ZKDevelopersReferenceHeadingToc}} | ||
{{ZKDevelopersReferencePageFooter}} | {{ZKDevelopersReferencePageFooter}} |
Latest revision as of 04:43, 1 October 2013
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report here (PDF).