Official (Isc)2 Guide to the Csslp Cbk, Second Edition

by

Write The First Customer Review

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security ...

Official (Isc)2 Guide to the Csslp Cbk, Second Edition 2013, Auerbach Publications, London

ISBN-13: 9781466571273

2nd edition

Hardcover

Select