Web application security

Results: 759



#Item
271HTTP / Cryptographic protocols / Secure communication / Electronic commerce / Network protocols / Transport Layer Security / Session / HTTP Secure / HTTP cookie / Computing / Internet / Cryptography

GlassTube A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-04-29 05:47:46
272Computer network security / Akamai Technologies / Content delivery network / Application firewall / Network performance / Denial-of-service attack / Load balancing / DNS spoofing / Anycast / Computing / Internet / Network architecture

White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications Table of Contents

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2012-01-25 15:24:03
273Data / Business intelligence / Business requirements / Dashboard / Enterprise application integration / Web services / Data management / Information technology management / Computing

Data integration is paramount to run your business. And the security and governance of that integration is more important than ever,

Add to Reading List

Source URL: www.cleo.com

Language: English - Date: 2014-02-13 16:43:34
274Cross-platform software / Software architecture / Web development / Web application frameworks / CNR / Installation software / Datasource / JavaScript / Web application / Software / Computing / System software

CNR Security Web Service Explanation & Samples

Add to Reading List

Source URL: www.cizer.com

Language: English - Date: 2006-08-16 15:09:38
275Workflow technology / Security / Password / User provisioning software / Web Access Management / IBM Lotus Notes / Workflow application / Workflow / BoKS / System software / Software / Identity management

COSuser web browser workflow User Interface COSuser web browser workflow User Interface User provisioning software such as COSuser provides a quick Return on Investment ("RoI") when implemented correctly. Of all the eff

Add to Reading List

Source URL: www.cosuser.com

Language: English - Date: 2011-03-31 09:55:00
276Software / Computing / Security appliance / Antivirus software / Blue Coat Systems / Malware

Blue Coat ProxyAV 510 Stop malware at the Web gateway Blue Coat ProxyAV™ offers advanced malware detection at the gateway as part of the Application Delivery Network (ADN) infrastructure that provides complete applica

Add to Reading List

Source URL: blue-coat.ru

Language: English - Date: 2014-03-10 14:41:02
277Computer networking / Network performance / Web threat / Phishing / Proxy server / Website / Malware / K9 Web Protection / Cloud computing / Computing / Cybercrime / Internet

Blue Coat WebFilter CONTROL ACCESS TO WEB CONTENT AND BLOCK WEB THREATS As part of the Application Delivery Network (ADN), an infrastructure that provides complete application visibility, acceleration and security, Blue

Add to Reading List

Source URL: blue-coat.ru

Language: English - Date: 2014-03-10 14:36:38
278Computer security / Firewall / Web application security / Application security / Denial-of-service attack / Application firewall / Armorlogic / Computer network security / Computing / Cyberwarfare

cloud ips/firewall The best of Dedicated and Cloud Computing together Global Protection and Prevention at the Edge of the Internet The Total Uptime Cloud IPS/Firewall protects Web applications at the very edge of the Int

Add to Reading List

Source URL: totaluptime.com

Language: English - Date: 2015-02-27 13:49:50
279Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
280Computing / Aspect-oriented software development / Java enterprise platform / Cross-platform software / Web application frameworks / Spring Framework / AspectJ / Compass / Aspect / Software development / Software / Aspect-oriented programming

Security Solutions & Training AOP & Security • Using Aspect Oriented Programming to

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
UPDATE