Web application security

Results: 759



#Item
31Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
32Digital rights management / Malware / Computer security / Internet advertising / Computer network security / Identity theft / Rogue software / Spyware / Internet privacy / Origin / Web browser / Application software

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
33Hacking / Cyberwarfare / Fiction / Computer security / Firefly / Vulnerability / Application security / Web browser / Cross-site scripting

PDF Document

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-03-06 11:28:34
34Computing / Computer security / Cyberwarfare / Computer network security / Cross-site scripting / OWASP / SQL injection / Web application security / Code injection / JavaScript / Character encodings in HTML / HTTP header injection

      OWASP Top 10 Proactive Controls 2016 

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2016-01-25 17:05:07
35Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

Add to Reading List

Source URL: worldcomp-proceedings.com

Language: English - Date: 2014-05-28 12:08:56
36Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
37Computer security / Security / Computing / Veracode / Software testing / Web application firewall / Application security / Vulnerability / Application firewall

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
38Computing / Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Application firewall / Application security / Information security / Web application firewall / Michigan State University

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
39Computing / Internet / Dark web / Internet security / Secure communication / Tor / Network architecture

Employment Application • THE BASICS • Name (last, first, middle)____________________________________________________ My Current Address _______________________________________________________________________________

Add to Reading List

Source URL: macrinabakery.com

Language: English - Date: 2013-09-05 18:30:59
40Computing / Web services / Enterprise application integration / Software / Architectural pattern / Service-oriented architecture / WS-Security / SOA Security / Security Assertion Markup Language / Software testing / XML appliance / Rational Service Tester for SOA Quality

Issue LIX • FebruaryFundamentals of SOA Security Testing by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article describes the foundations of SOA security testing including functional, performance, in

Add to Reading List

Source URL: www.servicetechmag.com

Language: English - Date: 2012-02-20 16:15:24
UPDATE