Do a Google search on “connection pool leak?” Briefly describe the nature of this threat. Is this threat specific to a certain technology or technology platform (say Microsoft’s ADO.Net data reader)? Propose a method for assessing an application’s vulnerability to this type of threat.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here