The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2010 vol. 12)
ISSN: 1520-9202
pp: 7-9
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.</p>
Information technology, security and privacy
John R. Maguire, H. Gilbert Miller, "Web-Application Security: From Reactive to Proactive", IT Professional, vol. 12, no. , pp. 7-9, July/August 2010, doi:10.1109/MITP.2010.117
92 ms
(Ver 3.1 (10032016))