Application Security in the ISO 27001:2013 Environment, 2nd Edition
- 2h 27m
- Vinod Vasudevan, et al.
- IT Governance
Describing the methods used by criminal hackers to attack organizations via their web applications, this book explains how organisations can implement and maintain effective security practices to protect their web applications - and the servers on which they reside - as part of a wider information security management system.