Hackers have clawed their way into the application layer. These four products keep them from looting or trashing your Web apps Web-based applications have become vital pieces of business ...