Download now Free registration required
IT security and network administrators are responsible for protecting their networks and everything that runs on them, including Web applications. When there is a breach or an exploit, the responsible security team (or person) becomes the center of attention. This "Attention" comes with a high price tag; in 2007 alone, security breaches cost United States companies over $4 billion. Widespread use of Web 2.0 applications such as social networking, instant messaging, web mail and RSS are bypassing existing vulnerability detection technologies and working their way into enterprise networks. For these reasons, Web applications need to be audited on a regular basis and closely monitored for changes and improper usage.
- Format: PDF
- Size: 703.7 KB