October 2019
Intermediate to advanced
374 pages
13h 10m
English
Many applications tend to run as either client or server components. Clients generally initiate connections and request services from servers. Servers generally listen for incoming connection and respond to requests. Your approach to securing each type of application software will be different. Client applications are often targets because many workstations, laptops, and mobile devices are not aggressively hardened. With so many personal computers that are insecure and contain client applications, common applications are attractive to attackers who want to compromise an organization’s data. If an attacker can compromise a client application that an organization uses to access a server application, ...
Read now
Unlock full access