10 Immutable Laws of Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore Law #3: If a bad guy has unrestricted physical access to your computer, it’s not… Continue reading 10 Immutable Laws of Security

Published
Categorized as General

Patterns For Large-Scale JavaScript Application Architecture

Can you summarize this article in 140 characters? In the event of you being short for time, here’s the tweet-sized summary of this article: Decouple app. architecture w/module,facade & mediator patterns. Mods publish msgs, mediator acts as pub/sub mgr & facade handles security What exactly is a ‘large’ JavaScript application? Before we begin, let us… Continue reading Patterns For Large-Scale JavaScript Application Architecture

Published
Categorized as General