2.3.1 Defensive design
Defensive design considerations:
Defensive design considerations:
Anticipating misuse
Anticipating misuse
Authentication
Authentication
Input validation
Input validation
Maintainability
Maintainability
Use of sub programs
Use of sub programs
Naming conventions
Naming conventions
Indentation
Indentation
Commenting
Commenting