online and offline security strategy / sites/applications / Web Requests / web applications / web servers / online defense / automated application vulnerability assessment tool / cross site / particular web site / web vulnerabilities / using an automated application vulnerability assessment tool / /