Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
IBM Lotus Domino: Classic Web Application Development Techniques

You're reading from   IBM Lotus Domino: Classic Web Application Development Techniques This tutorial takes Domino developers on a straight path through the jungle of techniques to deploy applications on the web and introduces you to the classic strategies. Why Google it when it‚Äôs all here?

Arrow left icon
Product type Paperback
Published in Mar 2011
Publisher Packt
ISBN-13 9781849682404
Length 344 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Richard G Ellis Richard G Ellis
Author Profile Icon Richard G Ellis
Richard G Ellis
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

IBM Lotus Domino: Classic Web Application Development Techniques
Credits
About the Author
About the Reviewers
www.PacktPub.com
1. Preface
1. Preparation and Habits FREE CHAPTER 2. Design and Development Strategies 3. Forms and Pages 4. Navigation 5. Cascading Style Sheets 6. JavaScript 7. Views 8. Agents 9. Security and Performance 10. Testing and Debugging

Security


In most applications, security controls are implemented fundamentally to protect data stored in documents against unauthorized access and against unauthorized change or deletion. As the developer, you will need to know who accesses your application, what they are allowed to see, and what they are allowed to do and when they are allowed to do it.

Two key concepts can guide application security deliberations.

Layered security, also referred to as defense in depth, refers to the implementation of several barriers that must be penetrated before a user is allowed to access specific data. Depending upon organizational and application requirements, these are the kinds of controls that can be implemented:

  • A user must have a Notes account and password to access the Domino environment.

  • A user must be authorized to access the server hosting the application.

  • A user must be authorized to access the application.

  • A user must be authorized to use certain design elements, such as views and forms...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image