From Documentation

Jump to: navigation, search






This chapter describes how to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can also refer to a detail report here (PDF).





Copyright © Potix Corporation. This article is licensed under GNU Free Documentation License.