-
Notifications
You must be signed in to change notification settings - Fork 0
Lesson 14 Using EJS in a Database Application
John R. McGarvey edited this page Apr 12, 2024
·
2 revisions
In this lesson, the first step is to fix the security. In particular, the Cross Site Request Forgery attack is demonstrated, and then the student is given instructions on how to defend against the attack. The other standard packages for security protections are added.
CRUD operations for managed data are added. The sample solution uses the Job model, but students may elect to use the data model they created for lessons 9 through 11 instead.