Web application security

Results: 759



#Item
471Computer law / Credit cards / Data privacy / Payment systems / Application firewall / Malware / Payment Card Industry Data Security Standard / Instant messaging / Vulnerability / Computing / Computer security / Cyberwarfare

SiteLock Launches Web Application Firewall (WAF) and Content Delivery Network (CDN) WAF and CDN Enhance 360о Security for Online Businesses Scottsdale, AZ (PRWEB) March 19, [removed]SiteLock LLC (www.sitelock.com), a lea

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2013-03-19 03:08:38
472Software / Remote procedure call / Web application frameworks / Web Services Description Language / Web 2.0 / SOAP / ASP.NET / Ruby on Rails / Web Services Invocation Framework / Computing / World Wide Web / Web services

SOAP Web Services Attacks Part 1 – Introduction and Simple Injection Are your web applications vulnerable? by Sacha Faust

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-11-18 10:35:09
473Computer network security / Qualys / Cloud computing / Application firewall / Data security / Philippe Courtot / Application security / Web Access Management / Infrastructure optimization / Computer security / Computing / Cyberwarfare

1/2 PRESS RELEASE[removed]

Add to Reading List

Source URL: www.bee-ware.net

Language: English - Date: 2013-02-28 11:15:54
474Security / OWASP / Software testing / Web application security / Application security / Vulnerability / Imperva / Computer network security / Computer security / Cyberwarfare

Don’t Bring A Knife To A Gun Fight: The Hacker Intelligence Initiative Robert Rachwald

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:52
475Cloud computing / Vulnerability / Application security / SAINT / Application firewall / Computer security / Computing / Cyberwarfare

Cenzic Desktop Application Security for Cloud and Web Applications Cenzic Desktop is a single-user version of Cenzic Enterprise, a software solution that assesses the security of Cloud and Web applications and

Add to Reading List

Source URL: www.cenzic.com

Language: English - Date: 2014-03-07 17:44:27
476Computing / Computer network security / Rapid7 / Penetration test / Security / Application security / OWASP / Security testing / Web application security / Computer security / Software / Software testing

Web Application Penetration Testing What is it? In addition to the Open Source Security Testing Methodology Manual (OSSTMM) and the Penetration Testing Execution Standard (PTES) Rapid7’s application penetration testing

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:12
477Computer network security / Software testing / Cross-site scripting / Vulnerability / SQL injection / Application security / Remote file inclusion / Web application security / Web application security scanner / Computer security / Cyberwarfare / Failure

Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners David A. Shelly Thesis submitted to the Faculty of the

Add to Reading List

Source URL: scholar.lib.vt.edu

Language: English - Date: 2010-08-10 18:47:47
478Cyberwarfare / Software testing / Relational database management systems / SQL / SQL injection / Imperva / Vulnerability / Web application security / Penetration test / Computing / Computer security / Computer network security

January 2013 Hacker Intelligence Initiative, Monthly Trend Report #15 Lessons Learned From the Yahoo! Hack How SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy 1. Executive Summary

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-01-28 14:35:53
479Cyberwarfare / Global Information Assurance Certification / Software testing / SANS Institute / Web application security / Programmer / Software engineering / Application security / Vulnerability / Computer security / Computing / Computer network security

SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and largest source for information security training and certification in the world. SANS teach

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
480Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:58:14
UPDATE