Security Tips
From Documentation
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report here
Last Update : 2013/10/01
Copyright © Potix Corporation. This article is licensed under GNU Free Documentation License. |