The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2010 vol. 12)
ISSN: 1520-9202
pp: 7-9
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.</p>
Information technology, security and privacy

J. R. Maguire and H. G. Miller, "Web-Application Security: From Reactive to Proactive," in IT Professional, vol. 12, no. , pp. 7-9, 2010.
83 ms
(Ver 3.3 (11022016))