May 2018
Intermediate to advanced
378 pages
10h 14m
English
After all appropriate data controls are identified and designed into the cloud computing solution, applications themselves need to be hardened against attack. The best guidance for this hardening process is the OWASP top 10, which lists the 10 most critical web application security risks. Refer to https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf for a detailed list along with the description of each risk.
Read now
Unlock full access