Web application security

Results: 759



#Item
231Cross-site scripting / HTTP cookie / Application security / JavaScript / Hypertext Transfer Protocol / Session / Application server / Transport Layer Security / Digest access authentication / Computing / HTTP / Computer security

Developing Secure Web Applications White Paper Izhar Bar-Gad Amit Klein

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 16:08:47
232Smartphones / Computer security / Mobile Web / Penetration test / Mobile phone / IPhone / Application security / Mobile business intelligence / Mobile commerce / Technology / Electronics / Mobile technology

Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-24 06:20:09
233Outlook Web App / Microsoft Exchange Server / Owa / Calendar / Application software / Software / Computing / Calendaring software / Groupware / Personal information managers

Outlook Web Access Productivity and Security Messageware CalendarShare Provide additional functionality to calendaring in OWA CalendarShare adds Outlook-like features to enhance OWA calendaring, making it easier to view

Add to Reading List

Source URL: www.messageware.com

Language: English - Date: 2011-11-24 13:59:01
234Outlook Web App / Data synchronization / Owa / Microsoft Exchange Server / Application software / Software / Computing / Groupware / Calendaring software / Personal information managers

Outlook Web App/Access Productivity and Security Messageware OWA Print Outlook-like Printing Options in OWA OWA Print adds powerful printing capability for calendars and contacts from within Outlook

Add to Reading List

Source URL: www.messageware.com

Language: English - Date: 2011-11-24 13:59:33
235Computer network security / Software testing / Risk / Market research / Vulnerability / Cross-site scripting / Penetration test / Survey methodology / SQL injection / Cyberwarfare / Computer security / Security

Effort Estimates on Web Application Vulnerability Discovery

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2012-12-08 23:54:39
236HTTP / World Wide Web / Markup languages / Computer network security / JavaScript / Cross-site scripting / HTTP cookie / Form / HTML / Computing / Software / Cross-platform software

Abstracting Application-Level Web Security David Scott Richard Sharp Laboratory For Communications Engineering

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2011-10-25 12:01:10
237Content delivery network / Computer network security / Prolexic Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Internet / Computing / Akamai Technologies

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Application-Based Monitoring Application-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with cu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-23 10:16:01
238Application firewall / Cyberwarfare / Firewall / Payment Card Industry Data Security Standard / Riverbed Technology / Armorlogic / Outpost Firewall Pro / Computer network security / Computing / Computer security

Riverbed Stingray Application Firewall Brochure: Riverbed Stingray Application Firewall Stingray Application Firewall is a sophisticated, application-aware Web Application Firewall for deep

Add to Reading List

Source URL: www.datum.com.sg

Language: English - Date: 2011-11-10 03:02:15
239Computer security / Computer network security / Veracode / Software testing / Application security / Software as a service / Vulnerability / Application firewall / Computing / Centralized computing / Cloud computing

VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-04-14 16:19:18
240Malware / Trend Micro / Computing / Cyberwarfare / Computer network security / Trend Micro Internet Security / Antivirus software / Computer security / Application firewall

GETTING STARTED GUIDE Trend Micro™ Deep Security for Web Apps This document steps you through the basics of how to get started using Trend Micro Deep Security for Web

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2015-01-14 19:52:37
UPDATE