Chapter 26. Web Applications and Security

By Steve Steffen and Jeff Marin

IN THIS CHAPTER

Every day, computers around the world are hacked into and used for malicious purposes. Living in a media-driven society, we expect to hear reports of these incidents on the news and read about them in newspapers. However, these events are rarely reported due to embarrassment and damage to the reputation of the company or government agency that these computers are under the control of. Therefore, it's up to us in the software development food chain to proactively research ...

Get BEA WebLogic Server™ 8.1 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.