Security Tips
From Documentation
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several issues worth to take a look.
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several issues worth to take a look.
Last Update : 2010/11/17
Copyright © Potix Corporation. This article is licensed under GNU Free Documentation License. |