Deploying Web-Based Applications

Deploying Web-Based Applications

Name of Student

Name of Institution



Date of submission

Deploying Web-Based Applications

Alternative for the company to deny developers direct copy to the company’s code

In order for the company to ensure that its security is not breached, either by a web-based database developer responsible for its creation or by hackers, it has to use security based-alternative methods that are available to guarantee safety of its information. Since this is considered as a security measure for the company’s information, the company has to act with precaution when deciding which method to use to protect its data. Several methods can be used, some of which include; request refusal, deny, request optional, permit only, assert, inheritance demand, demand, link demand, and request minimal method.

Although considered out-dated, some of these methods can still be used to basically guarantee the company’s information safety. Request refusal method only grants access to the company’s codes to its members if the intention of their call is considered useful and that they will not interfere with the company’s resources. Deny method limits access of the company’s code to members who might tamper in any way with the company’s specified resources. Request optional method grants access of codes to members of the company for no additional permissions of the company’s information. This method denies members any other permission that is not specified. Permit only method gives access to the information pertaining the company’s resources that is only permitted to that company’s member. Assert method only gives access of codes to members regarding identified resources of the company that are permissioned to access current resources. Inheritance demand method gives access of codes to members who are next in line in the management of the company. Demand method gives access to codes to the specified members who have the specific permission to permitted resources. Link demand method gives access of codes to the immediate members of the company concerning the specified permission of the company’s resources. Request minimal method gives access to the company’s codes to the members who under minimum permission need the code to run resources that are required by the company.

How to Create a MSI File

MSI file or package is a Microsoft Installer package that is created and installed in the installer program. It comprises of necessary keystrokes that are used for the installation of the package in the program. On its own, it is intended to perform all the silent processes of installation without necessity of an attendee. The steps involved in creating a MSI file or package include;

Choosing the file to install

Creating a project, MSI file or package, by the use of windows installer

The user then chooses the file or package and adds it

S/he then build and later on installs the package on their company’s computer

Then the user verifies the packages completion by locating it in partition C of the company’s computer

S/he then edits the company’s name and its application information that reflects s/he and the company’s project

Verifies the changes by building, installing, and running the package once again

The user then uninstalls the original MSI package or file in order to avoid competition between the installed program and the one on the dick

S/he then creates a shortcut for the created MSI file or package