Vulnerabilities of applicationsComputer science / By Brian Leakey Explain the vulnerabilities of applications and how they are mitigated.