Chapter 15. User Management
After spending time in the previous chapters looking at what web applications are and how we would go about presenting a user interface, we will now turn to the users themselves. It is important to understand how they interact with our application, how (and when) to distinguish them from visitors, and how to protect them from other malicious visitors.
In this chapter, we will