11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

330 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sThe preceding example uses the following simple XSD schema to validate theinput data.The following table shows additional complex element definitions that can be used inan XSD schema to further constrain individual XML elements.Table 12.1 XSD Schema Element ExamplesDescriptionExampleUsing regular expressions to constrain XMLelementsConstraining a decimal value to two digitsafter the decimal pointConstraining the length of an input string

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!