Chapter 8Security and Compliance: MaintainingControl While Providing Flexibility
Copyright © 2009 by The McGraw-Hill Companies. Click here for terms of use.
Since Web 2.0 platforms enable anyone to upload content, these sites are easily susceptible to hackers wishing to upload malicious content. Once the malicious content has been uploaded, innocent visitors to these sites can also be infected, and the site owners could be potentially responsible for damages incurred.
Yuval Ben-Itzhak, SC Magazine
With businesses investing in and adopting applications leveraging Web 2.0 technologies, it is imperative that applications be designed to address not only the same security issues and regulations as any other enterprise-class application, ...
Get Reshaping Your Business with Web 2.0 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.