January 2007
Intermediate to advanced
1344 pages
37h 53m
English
IN THIS CHAPTER
In today’s risk-fraught computing environment, any exposed service is subject to frequent attack from the Internet. This is particularly true for web services, including those offered by Outlook Web Access (OWA), Exchange ActiveSync, ...