Web application security

Results: 759



#Item
241Cyberwarfare / Crime prevention / National security / Chief information security officer / OWASP / Application security / Web application security / Information security / Threat / Computer security / Security / Computer network security

CISO Survey and Report CISO Survey and Report 2013 VersionJanuaryProject Lead and Main Author

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-02-25 15:07:50
242Computer network security / Software testing / Electronic commerce / Secure communication / Web application security / Application firewall / Cross-site scripting / Penetration test / Application security / Computer security / Cyberwarfare / Computing

Building Web Applications Security Recommendations for Developers Web applications on Internet-facing systems allow access to everyone and operate 24 hours a day and 7 days a week, which leaves them open to attack.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-07-10 11:37:41
243Computer networking / Network performance / Web threat / Phishing / Proxy server / Website / Malware / K9 Web Protection / Cloud computing / Computing / Cybercrime / Internet

Blue Coat WebFilter CONTROL ACCESS TO WEB CONTENT AND BLOCK WEB THREATS As part of the Application Delivery Network (ADN), an infrastructure that provides complete application visibility, acceleration and security, Blue

Add to Reading List

Source URL: blue-coat.ru

Language: English - Date: 2014-03-10 14:41:52
244OWASP / Vulnerability / Computer security / Security / Cyberwarfare

Jeff Williams Röportajı OWASP Turkey, Aralık 2010, WGT E-Dergi 7. Sayı 1. How did you end up dealing with web/application security? The short answer is that I’ve been making software fail since the early 1980’s a

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:54:09
245Outlook Web App / Groupware / Data synchronization / Application software / Software / Owa / Microsoft Outlook / Microsoft Exchange Server / Calendaring software / Personal information managers / Email

Critical End-Point Security The only OWA Application Specific security in the industry! Necessary additions to ISA, TMG, RSA, and Other Perimeter Devices, Essential for stand-alone environments. Protect documents from

Add to Reading List

Source URL: www.messageware.com

Language: English - Date: 2012-01-26 10:09:45
246Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
247Computer network security / Application security / Security / Vulnerability / Web application security / SCADA / Cyberwarfare / Computer security / Technology

Professional Development Seminar Free Admission for ISACA China HK Chapter members [All ISACA China HK Chapter members: Please remember to bring along your Confirmation Ticket to the venue for verification should you wis

Add to Reading List

Source URL: www.isaca.org.hk

Language: English - Date: 2014-05-15 00:13:43
248Computing / Data security / Hacking / Application firewall / Firewall / Vulnerability / Denial-of-service attack / Web application security / Malware / Computer network security / Computer security / Cyberwarfare

www.sangfor.net Next Generation Security for your Business SANGFOR Next Generation Firewall

Add to Reading List

Source URL: www.sangfor.net

Language: English - Date: 2014-10-24 15:12:19
249Security / Telephone numbers in the United Kingdom / Certified copy / Notary public / Identity document / Retirement / Finance / Notary / Law / Government

Sovereign Conservo application form_WEB

Add to Reading List

Source URL: www.sovereigngroup.com

Language: English - Date: 2015-04-01 08:22:00
250Security / Web services / Service-oriented architecture / SOA Security / WS-Federation / Computer security / IBM / Enterprise service bus / Computing / Information technology management / Enterprise application integration

Colorado Software Summit: October 23 – 28, 2005 © Copyright 2005, IBM Corporation SOA Security Programming Model

Add to Reading List

Source URL: www.softwaresummit.com

Language: English
UPDATE