Books 2 Byte
Enterprise 2.0 Implementation
Aaron C. Newman and Jeremy G. Thomas
Auditing Enterprise 2.0 for security vulnerabilities can be broken down into two pieces, say Aaron C. Newman and Jeremy G. Thomas in Enterprise 2.0 Implementation. One, look for publicised security holes in off-the-shelf software, such as WordPress, Socialtext, or Twiki; and two, review in-house applications.