IBM Books

Net.Data Programming Guide


Keeping Your Assets Secure

Although Net.Data does not provide any type of security measures directly, you can keep your assets secure with existing measures you probably already use to protect your system and data. You must decide what level of security is appropriate for your assets.

Yet another method to protect your assets is to create your own protection scheme using Net.Data. For example, you can request validation information from a user through and HTML form and validate it using data in a database or through an external program called from a Net.Data macro.

You also protect your assets by the SQL statements you allow people to send to the database. For example, limiting SELECT statements to two tables. For more information on protecting your assets, see the Internet security list of frequently asked questions (FAQ) at this Web site:

http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html

For additional security, consider using hidden variables to conceal your database's internal structure from people who choose to view your HTML source with their Web browser. See "Hidden Variables" for more information.


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]