Security has varying degrees of implementation; there’s never a black-and-white answer. The question of how much security is needed is followed up by additional questions regarding the value of what is being protected and the risks, repercussions, and likelihood of it being sought after. For every security measure, there will always be someone trying to circumvent it. This chapter will review basic security features and an approach to securing the Help Desk application. The concepts reviewed here apply to all APEX applications and are specific to the APEX framework.


Access Control Authentication Scheme Database Object Menu Item Entry Section 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Supplementary material (2 kb) (zip 3 kb)

Copyright information

© Doug Gault 2015

Authors and Affiliations

  • Doug Gault
    • 1
  1. 1.TXUS

Personalised recommendations