Application security

Results: 14395



#Item
621

Securing Enterprise Web Applications at the Source: An Application Security Perspective

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:28
    622Series / Software / Cryptography / Prevention / Password / Security / Microsoft Word

    Password Strength Meter Password Strength Meter Registration form is like the first step that user needs to take to use your web application. It’s interesting how often it is not optimal part of the app. Having an un

    Add to Reading List

    Source URL: reactkungfu.com

    Language: English - Date: 2016-03-30 14:05:58
    623Security / Computing / Information technology management / Information system / Computer security / Application software / Web development / Information technology consulting / ICDC College / Professional certification

    WHAT CAN I DO WITH THIS DEGREE? COMPUTING & INFORMATION SYSTEMS (CIS) INTRODUCTION The College of Information Technology at University of Dubai offers a Bachelor Degree in Computing and Information Systems (CIS) that is

    Add to Reading List

    Source URL: www.ud.ac.ae

    Language: English - Date: 2013-12-26 01:11:20
    624Computer network security / Computer security / Software testing / OpenVAS / Nessus / Penetration test / Hacking / Nmap / Vulnerability / Application firewall

    Jordan Wright Permanent Address: 5903 Babcock Rd. AptSan Antonio, TXContact: jordan-wright.github.io

    Add to Reading List

    Source URL: jordan-wright.com

    Language: English - Date: 2016-04-10 15:44:49
    625Cryptography / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Keystore / Java Platform /  Enterprise Edition / Application server / Certificate authority / Java Secure Socket Extension

    J2EE Security for Servlets, EJBs and Web services Pankaj Kumar Software Architect, HP Date: March 28, 2003

    Add to Reading List

    Source URL: pankaj-k.net

    Language: English - Date: 2007-02-02 01:42:32
    626Computing / Cloud computing / Cloud infrastructure / Software architecture / Cloud storage / As a service / Amazon Web Services / Web hosting / Data center / Software as a service / Load balancing / Application server

    BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits to our custome

    Add to Reading List

    Source URL: bebanjo.com

    Language: English - Date: 2016-04-13 04:48:08
    627

    4th Annual State of Application Security Report A Look Inside the Universe of Pirated Software and Digital Assets 2015 Mid-Year Report

    Add to Reading List

    Source URL: www.arxan.co.jp

    Language: English - Date: 2015-08-25 01:34:26
      628Computing / Cryptography / Security / E-commerce / Mobile security / Bluetooth / Copyright law of the United States / Copyright / Public key infrastructure / Computer security

      Mobile Application Security David Vo (Dvo) Dec 15, 2015 Copyright © 2015 nVisium LLC · www.nvisium.com

      Add to Reading List

      Source URL: nvisium.com

      Language: English - Date: 2015-12-17 16:41:53
      629

      Security Solution Sheet Arxan Application Protection For Financial Services What We Do

      Add to Reading List

      Source URL: www.arxan.co.jp

      Language: English - Date: 2015-08-25 01:35:09
        630

        Security Solution Sheet Arxan Application Protection for the Connected Car What We Do

        Add to Reading List

        Source URL: www.arxan.com

        Language: English - Date: 2016-02-25 15:16:56
          UPDATE