This document summarizes key points about application security from the CISSP Guide to Security Essentials. It discusses various types of applications like agents, applets, client-server, distributed, and web applications. It also covers application models and technologies, common application threats like buffer overflows and malware, and countermeasures. Finally, it discusses the importance of security throughout the software development life cycle and lists controls that should be present in applications, like authentication, authorization, and audit logging. It also provides an overview of database concepts, architectures, transactions, and security controls.