This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "CRV2 TransLogic"
From OWASP
(Created page with "This is covered in the google doc.") |
|||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | This | + | This page needs to be deleted |
+ | |||
+ | |||
+ | ==idempotence== | ||
+ | |||
+ | Is the property of certain operations can be applied multiple times without changing the result beyond the initial application. | ||
+ | |||
+ | The concept of idempotence arises in a number of places. The request methods of the HyperText Transfer Protocol (HTTP) computer protocol are a common example of idempotence, in that data retrieval operations can be performed without changing or otherwise affecting the data |
Latest revision as of 02:12, 16 June 2014
This page needs to be deleted
idempotence
Is the property of certain operations can be applied multiple times without changing the result beyond the initial application.
The concept of idempotence arises in a number of places. The request methods of the HyperText Transfer Protocol (HTTP) computer protocol are a common example of idempotence, in that data retrieval operations can be performed without changing or otherwise affecting the data