Information security in PHP: the CIA triad approach

Comments

Comments are closed.

Pacing was slow. Too much about how ZF does things that could have been copied from the manual, and not enough general information.

Rated 3

Anonymous at 16:07 on 29 Oct 2014

Rated 3

Anonymous at 16:07 on 29 Oct 2014

Great job taking a complex topic and covering it in an understandable. Very knowledgable.

Excellent, well structured talk. I would have liked to see more detail on how to approach integrating these concepts into an application (eg: how to do HMAC validation of data loaded from storage), but I know that can be tricky as it's often application-specific.