This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report here (PDF).
|Copyright © Potix Corporation. This article is licensed under GNU Free Documentation License.|