Month: January 2014
-
10 Immutable Laws of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore Law #3: If a bad guy has unrestricted physical access to your computer, it’s not…
-
Patterns For Large-Scale JavaScript Application Architecture
Can you summarize this article in 140 characters? In the event of you being short for time, here’s the tweet-sized summary of this article: Decouple app. architecture w/module,facade & mediator patterns. Mods publish msgs, mediator acts as pub/sub mgr & facade handles security What exactly is a ‘large’ JavaScript application? Before we begin, let us…