Publishers of technology books, eBooks, and videos for creative people
In this chapter from Swift for Beginners: Develop and Design, you’ll learn how to tidy up your Swift code into nice clean reusable components called functions.
Learn how to create and manage user accounts for a simple e-commerce system using PHP and MySQL.
A true workspace in Xcode is a container that encompasses multiple projects that share common resources. This chapter shows you how to create an application suite consisting of an OS X application, an iOS application, and a shared framework that encapsulates all the common components.
In this chapter from Python: Visual QuickStart Guide, 3rd Edition, Toby Donaldson shows how to change the order in which statements are executed by using if-statements and loops. Both are essential in almost any nontrivial program.
Many factors go into the security of a Web site, particularly an e-commerce one. While creating a secure Web application in the first place is a key component, there's an easy way to improve the security of a site over time: by maintaining secure passwords. In this post, I'll explain what this means.
A feature of many of today's Web sites is the ability for users to upload files to the server. While often necessary, this process presents a new type of risk to servers and sites, whether any user can upload a file or just an administrator can. In this post, I explain what steps you can take to limit the risks of allowing for file uploads.
The bulk of security-related advice is based upon preventing break-ins, hacks, and attacks, but responsible e-commerce developers and administrators know that it's just as important to have created an emergency plan well before trouble occurs. In this post, Larry Ullman talks about why an emergency plan is important and what, exactly, that means.
The security of an e-commerce site depends upon so many things: the hosting involved, keeping all the software updated, using secure passwords, and so forth. But when it comes to the software you write--the Web application itself--the most fundamental security concept is that incoming data is validated, validated, and validated. In this post, Larry Ullman writes about what that means, from the concept to the implementation.