The Devils Behind Web Application Vulnerabilities

Web Applications are frequently deployed with critical security bugs that can be maliciously exploited. Avoiding such vulnerabilities depends on the best practices and tools applied during the implementation, testing and deployment phases of the software development cycle. However, many times those practices are disregarded, as developers are frequently not specialized in security and face hard time-to-deploy constraints. Furthermore, the poor efficiency of existing automatic vulnerability detection and mitigation tools opens the door for the deployment of unsecure web applications.

Provided by: Institute of Electrical and Electronics Engineers Topic: Security Date Added: Aug 2011 Format: PDF

Find By Topic