Vulnerability database

Results: 242



#Item
41Template engines / Web application frameworks / Web development / Web applications / Web developer / Web application development / Mailto / CakePHP / Web application security / Software / Computing / World Wide Web

Downloaded from _http://dash.za.net_/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixin

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:16:02
42World Wide Web / Web applications / Web application frameworks / Template engines / Software architecture / Web developer / Web application development / CakePHP / Web application / Software / Computing / Web development

Downloaded from http://dash.za.net/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixing

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:32:52
43Statistics / Reliability engineering / Software quality / Design for X / Materials science / Vulnerability database / Failure rate / Vulnerability / Software Reliability Testing / Systems engineering / Failure / Survival analysis

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:34:47
44Cyberwarfare / Application firewall / Application security / Web application security / Vulnerability / Penetration test / Qualys / Imperva / Database security / Computer network security / Computer security / Computing

Building a Web Application Security Program Version 1.0 Released: March 9, 2009

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:13
45Computer network security / Auditing / Database management systems / Cross-platform software / Imperva / Database activity monitoring / Database security / Database audit / Vulnerability / Computer security / Computing / Cyberwarfare

Database Database Security Audit and Protect Critical Databases Best-in-Class Imperva SecureSphere Database Security products: » Audit all access to sensitive data

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2012-05-04 00:17:33
46Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
47Data / Relational database management systems / Database management systems / Subroutines / SQL injection / Stored procedure / Vulnerability / Code injection / Magic quotes / Data management / Computing / SQL

VISA Europe SQL Injection Attacks Data has become the preferred currency of today’s card criminals. Their aim is to obtain sensitive personal and account data. And, with so many online retailers routinely collecting an

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:45
48McAfee / Computer network security / Companies listed on the New York Stock Exchange / Password / Database security / SQL injection / Vulnerability / Oracle Corporation / Oracle Database / Computer security / Cyberwarfare / Security

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
49Security / Imperva / Application firewall / Vulnerability / Threat / Database security / Computer security / Cyberwarfare / Computer network security

Database SecureSphere Discovery and Assessment Server (DAS) Vulnerability Assessment and Configuration Audit SecureSphere Discovery and Assessment Server (DAS) identifies database vulnerabilities and measures compliance

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 00:17:42
50McAfee / Computer network security / Companies listed on the New York Stock Exchange / Password / Database security / SQL injection / Vulnerability / Oracle Corporation / Oracle Database / Computer security / Cyberwarfare / Security

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
UPDATE