Anatomy of a Web Application
February 16, 2012Without any protection, holes and backdoors exist at every layer waiting to be exploited
Each layer of the application has its own unique vulnerabilities. A vulnerability fixed at one layer may still be exploited at another layer. An exploit at any layer of the application effects the integrity and behavior for the entire application,
www.bestitdocuments.com