Security Tips"

From Documentation
m
 
Line 1: Line 1:
 
{{ZKDevelopersReferencePageHeader}}
 
{{ZKDevelopersReferencePageHeader}}
  
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report [[Media:ZK_Security_Report.pdf|here]]
+
This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report [[Media:ZK_Security_Report.pdf|here (PDF)]].
  
 
{{ZKDevelopersReferenceHeadingToc}}
 
{{ZKDevelopersReferenceHeadingToc}}
 
{{ZKDevelopersReferencePageFooter}}
 
{{ZKDevelopersReferencePageFooter}}

Latest revision as of 04:43, 1 October 2013


Security Tips


This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report here (PDF).



Copyright © Potix Corporation. This article is licensed under GNU Free Documentation License.