Security Goals | The Coder Zone
The main Goal of Security is to protect data or information which is being transmitted and achieve the Confidentiality Integrity & Availability of the data....
7 Years Ago
Security Attacks In Network Security | The Coder Zone
Security Attacks an attack is an action that comprises the information or network security. There are two types of attacks: Passive Attack and Active Attack...
7 Years Ago
Asymmetric Key Cryptography | The Coder Zone
Asymmetric key cryptography is called a public key cryptography.Asymmetric key cryptography two keys are used, one for encryption and other for decryption....
7 Years Ago
Symmetric Key Cryptography | The Coder Zone
Symmetric key cryptography also called as Secret key cryptography.Symmetric key cryptography a single key is used for encryption as well as decryption....
7 Years Ago
Working with JSON | The Coder Zone
A common use of JSON is to read data from a web server, and display the data in a web page. Objects in PHP can be converted into JSON by using the PHP function json_encode() in reverse you can use js...
7 Years Ago
Redirect Based On Referrer Or IP Address | The Coder Zone
Using PHP you can easily redirect your website visitors to a different page depending on where they come from. For example you may have 2 different web sites selling a product but only one customer ca...
7 Years Ago