We begin our discussion of the components of a secure application here in Chapter 9 by extending the notion of access control to the users of your online application.
KeywordsOptical Character Recognition Legitimate User Visual Disability Brute Force Attack ASCII Character
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
© Chris Snyder, Thomas Myer, and Michael Southwell 2010