Application security

Results: 14395



#Item
591

Automatic Application Security with Passe Aaron Blankstein and Michael J. Freedman Princeton University Partitioned Web Application Runtime with Constrained Queries Passe Development Cycle

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2013-11-02 22:06:28
    592Income distribution / Economy / Taxation in the United States / Government / Income taxes / Income tax in the United States / State income tax / Income tax in Australia / Social security in Australia / Social Security / Gross income / Income tax

    Aid for Part-time Study Application

    Add to Reading List

    Source URL: financialaid.buffalo.edu

    Language: English - Date: 2016-06-17 16:13:14
    593

    Case Study: Wiredrive Challenges Chose WhiteHat over: Checkmarx Motivated to invest in an application security solution for the following reasons: For compliance

    Add to Reading List

    Source URL: www.whitehatsec.com

    Language: English - Date: 2016-06-16 12:54:09
      594

      Application Security & Integrity Secure by Design • Raw data is parsed among hundreds of “tables” in Microsoft SQL Server. By combining the full features of MS SQL security framework within a fragmented table struc

      Add to Reading List

      Source URL: www.oerca.com

      Language: English - Date: 2014-07-23 14:12:34
        595Computing / Internet / Cloudflare / Content delivery network / Internet security / SPDY / Go

        CloudFlare reseller program Offer customers enhanced performance, security and availability, while increasing customer retention and generating new revenue. Protect and accelerate any website, API or web application. Ben

        Add to Reading List

        Source URL: www.cloudflare.com

        Language: English - Date: 2016-06-09 18:53:10
        596Instant messaging clients / Mobile telecommunications / Cross-platform software / Freeware / Portable software / Google Cloud Messaging / Android Cloud to Device Messaging / WhatsApp / Google Play / Google Talk / Skype / Mobile application development

        Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services Tongxin Li1 , Xiaoyong Zhou2,4 , Luyi Xing2 , Yeonjoon Lee2 , Muhammad Naveed3 , XiaoFeng Wang2 and Xinhui Han1 1

        Add to Reading List

        Source URL: web.engr.illinois.edu

        Language: English - Date: 2015-11-16 12:11:54
        597

        Java Application Crypto Analysis Cryptography is the essential enabling security technology of modern business networks. However, crypto is also complex and fragile, and often a source of vulnerabilities. Key Features

        Add to Reading List

        Source URL: cryptosense.com

        Language: English - Date: 2016-03-16 10:35:37
          598Payment systems / Credit cards / E-commerce / Credit card / Debit cards / 3-D Secure / Card security code / Charge card / American Express / Visa Inc. / Payment / Credit card fraud

          Issued by Swisscard AECS GmbH BASIC APPLICATION AMERICAN EXPRESS® CORPORATE MEETING CARD Please complete in full either electronically or in block letters. 5 – Method of billing and payment

          Add to Reading List

          Source URL: www.companycards.ch

          Language: English - Date: 2016-01-20 03:32:00
          599Cloud standards / Computer access control / OAuth / Federated identity / Cloud infrastructure / XACML / Cloud computing / User-Managed Access / Application programming interface / Web 2.0 / Spring Framework

          User-centered Security Management of API-based Data Integration Workflows

          Add to Reading List

          Source URL: demo.a-sit.at

          Language: English - Date: 2016-05-12 06:20:07
          600

          Application For exemption from laws on foreign exchange noApplicant* Name of applicant Social security number

          Add to Reading List

          Source URL: www.cb.is

          Language: English
            UPDATE