sponsored by IBM
Posted:  09 Sep 2009
Published:  01 Jan 2008
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
As Web applications become increasingly complex, tremendous amounts of sensitive data-including personal, medical and financial information-are exchanged and stored. Consumers expect and even demand that this information be kept secure. There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.





BROWSE RELATED RESOURCES
Application Security | Security Best Practices | Security Management | Security Threats | Web Analytics Software | Web Applications Management

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement