Moreover authentication and authorization for users is implemented. The web-application is also secured against SQL Injection and Cross-Site Scripting attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results