Monday, January 05, 2009

Beware of upgrades!

Books 2 Byte
Enterprise 2.0 Implementation
Aaron C. Newman and Jeremy G. Thomas
(http://www.tatamcgrawhill.com/)

Two vulnerabilities

Auditing Enterprise 2.0 for security vulnerabilities can be broken down into two pieces, say Aaron C. Newman and Jeremy G. Thomas in Enterprise 2.0 Implementation. One, look for publicised security holes in off-the-shelf software, such as WordPress, Socialtext, or Twiki; and two, review in-house applications.

More

No comments: