The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2010 vol.12)
pp: 7-9
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.</p>
Information technology, security and privacy
John R. Maguire, H. Gilbert Miller, "Web-Application Security: From Reactive to Proactive", IT Professional, vol.12, no. 4, pp. 7-9, July/August 2010, doi:10.1109/MITP.2010.117
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool