compliances , security

Anatomy of a Web Application

February 16, 2012

Without any protection, holes and backdoors exist at every layer waiting to be exploited

Each layer of the application has its own unique vulnerabilities. A vulnerability fixed at one layer may still be exploited at another layer. An exploit at any layer of the application effects the integrity and behavior for the entire application,

www.bestitdocuments.com