Security

The Devils Behind Web Application Vulnerabilities

Free registration required

Executive Summary

Web Applications are frequently deployed with critical security bugs that can be maliciously exploited. Avoiding such vulnerabilities depends on the best practices and tools applied during the implementation, testing and deployment phases of the software development cycle. However, many times those practices are disregarded, as developers are frequently not specialized in security and face hard time-to-deploy constraints. Furthermore, the poor efficiency of existing automatic vulnerability detection and mitigation tools opens the door for the deployment of unsecure web applications.

  • Format: PDF
  • Size: 420.5 KB