sponsored by IBM
Posted:  09 Sep 2009
Published:  01 Jan 2008
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
As Web applications become increasingly complex, tremendous amounts of sensitive data-including personal, medical and financial information-are exchanged and stored. Consumers expect and even demand that this information be kept secure. There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.

Application Security | Security Best Practices | Security Management | Security Threats | Web Analytics Software | Web Applications Management

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement