Database Reference
In-Depth Information
with no downtime, and no complicated coordination between several frontend sys-
tems and teams.
Simple ways to tighten security
If all access for some possibly insecure servers goes through functions, the database
user of these servers use can be granted only the access to the needed functions
and nothing else. They can't see the table data or even the fact that these tables
exist. So even if that server becomes compromised, all it can do is continue to call
the same functions. Also, there is no possibility to steal passwords, e-mails, or other
sensitive information by issuing its own queries like SELECT * FROM users; and
getting all the data there is in the database.
And the most important thing, programming in server is fun!
Search WWH ::




Custom Search