» security (RSS)
Sorry, but there are no more tags available to filter with.
This is the third part of a series (Part 1, Part 2) thinking out loud about the decision making around data access for applications. Once you've considered how tightly bound your application code can safely be to tables, I would like to put two related thoughts out there.
First, it's counterproductive, over the long term, to think of only the ...