Tech Industry

Discovering Vulnerable Web Applications

Free registration required

Executive Summary

This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

  • Format: PDF
  • Size: 602.27 KB