Free registration required
Using a security procedures checklist is your first step toward securing a resource -- a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites and Web servers.
This download is based on an entry in our IT Security blog.
- Format: PDF
- Size: 61 KB