Moreover, as I continued through the sections, I found a good deal of solutions to problems such as manipulating strings to check usenames and passwords; protecting email addresses; pre-filling forms; and creating a secured area that I didn't have the knowledge to solve before reading this book.