Web application security

Results: 759



#Item
261Cyberwarfare / Crime prevention / National security / ArcSight / Check Point / Information security / Secure Computing / Threat / Web application security / Computer network security / Computer security / Security

I N F O R M A T I O N ECURITY S J U LY/AU G U ST 2 011

Add to Reading List

Source URL: docs.media.bitpipe.com

Language: English - Date: 2011-08-09 15:23:45
262Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-29 16:36:01
263System software / Computer network security / Application firewall / ModSecurity / Firewall / Apache HTTP Server / World Wide Web / Evasion / Hostname / Software / Computing / Computer security

Protocol-Level Evasion of Web Application Firewalls

Add to Reading List

Source URL: community.qualys.com

Language: English - Date: 2015-02-09 23:07:14
264Java Web Start / Java / JAR / Rich Internet application / WebObjects / Computing / Java platform / Java version history

Feature Focus Java changes and ImageSite With no less than six Java updates released in the past year alone, Oracle has been addressing many of the longstanding security issues affecting Java. Unfortunately, every new re

Add to Reading List

Source URL: www.equorum.com

Language: English - Date: 2014-03-25 12:34:03
265Software testing / Computing / Hacking / Penetration test / Application security / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Computer network security / Cyberwarfare

SWAT PRODUCT BROCHURE WEB APPLICATION SECURITY Web application security has been a huge challenge for companies during the last couple of years since there are very few competent solutions available in the market. The

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-12-15 07:24:52
266Computer network security / Computing / Application security / Application firewall / Penetration test / Web application security / Vulnerability / Cross-site scripting / SQL injection / Computer security / Cyberwarfare / Software testing

Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:13:21
267Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-29 16:36:01
268Cross-platform software / Software testing / Cross-site scripting / JavaScript / HTTP cookie / Vulnerability / Form / Java / Application firewall / Computing / Computer security / Cyberwarfare

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
269Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
270Computer network security / Akamai Technologies / Content delivery network / Application firewall / Network performance / Denial-of-service attack / Load balancing / DNS spoofing / Anycast / Computing / Internet / Network architecture

White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications Table of Contents

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2012-01-25 15:24:03
UPDATE