Download now Free registration required
During the past two decades, many developers have been repeating the same mistakes - failing to validate inputs; inserting information that can be used to launch attacks within the application code; and failing to manage privileges properly, among many others. These mistakes were made during the stand-alone applications in the 1980s, the distributing computing architectures during the 1990s, and the initial wave of Web applications earlier this decade. Let's not continue the cycle as these new development platforms gains in popularity and functionality. The security of organization, and all of data, will depend on it.
- Format: PDF
- Size: 632.72 KB