Modeling Secure Systems

Table of contents:


  1. Develop a simple security policy document for an e-retail store.
  2. Examine a cookie file on your machine, and look for identifiers and codes that may be used to track your movements on the Internet. Search your cookie files, that is grep, for multiple instances of these codes across different domains.
  3. Change the security settings of your browser to warn you every time a cookie is placed on your browser, and then try to use some Internet-based Web applications.

Overview of Modeling and Web-Related Technologies

Building Web Applications

Building Web Applications With UML
Building Web Applications with UML (2nd Edition)
ISBN: 0201730383
EAN: 2147483647
Year: 2002
Pages: 141
Authors: Jim Conallen © 2008-2020.
If you may any questions please contact us: