Issue No. 04 - July/August (2010 vol. 12)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2010.117
John R. Maguire , Noblis
H. Gilbert Miller , Noblis
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.</p>
Information technology, security and privacy
J. R. Maguire and H. G. Miller, "Web-Application Security: From Reactive to Proactive," in IT Professional, vol. 12, no. , pp. 7-9, 2010.