Presentation Detail

Select Presentation  

TitleDeveloping Secure Applications
SpeakerRobin Tatam
PresentedFebruary 20, 2013
DescriptionAlthough your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level. This session will cover the main considerations that a programmer should be aware of as they design their applications: · Object ownership · Adopted authority · Public and private authorities · Command line permission · Client-server considerations Our discussion will include why auditors are often deemed to be a programmer’s nemesis, and what it is that they really need from us.
Home Page