Web application security

Results: 759



#Item
541Crime prevention / Data security / Information security / National security / Application software / Web development / Information Technology Infrastructure Library / Identity management / Help desk / Security / Information technology management / Computer security

FY09 Compact Planning Process Notes: Please submit any comments or questions to the Compact Planning Feedback Form. Phase I: Conduct Compact Planning Sessions 1 2

Add to Reading List

Source URL: eits.uga.edu

Language: English - Date: 2011-10-04 15:49:55
542Cover letter / Curriculum vitae / Personal life / Identity document / Email / Academic degree / Security / Employment / Recruitment / Management

HR201 APPLICATION FORM FOR STAFF VACANCIES

Add to Reading List

Source URL: web.uct.ac.za

Language: English - Date: 2014-09-22 05:40:14
543Crime prevention / Data security / Information security / National security / Internet privacy / Public records / Privacy / Family Educational Rights and Privacy Act / Public safety / Ethics / Privacy law / Security

EMPLOYEE Use this form to request access to the Download and View Applicant Data (DAVAD), Graduate Student Support (GSS) or Fellowship Web Application (FWA) systems. After carefully reading Page 2 of this form (Guidelin

Add to Reading List

Source URL: www.grad.uci.edu

Language: English - Date: 2012-11-27 12:48:28
544Government of South Africa / Information technology controls / Audit / Business / Information technology audit process / Information security audit / Auditing / Information technology audit / Auditor-General

NEWS RELEASE For Immediate Release Jan. 30, 2014 Auditor General Reports on IT Capital Spending, General IT Controls and Web Application Security

Add to Reading List

Source URL: www.bcauditor.com

Language: English - Date: 2014-01-30 13:30:38
545Computer security / Identity management / Web application / Internet Information Services / Security / Software / Access control

SYMMETRY ACCESS CONTROL ™ DATASHEET | ACCESS CONTROL | SYMMETRYWEB v2.0 CLIENT SOFTWARE

Add to Reading List

Source URL: www.amag.com

Language: English - Date: 2014-02-07 16:37:10
546Enterprise application integration / Web services / Service-oriented architecture / Corporate governance of information technology / Request for proposal / Chief information security officer / Information security / SAP AG / Governance / Business / Information technology management / Management

Microsoft Word - Final 2007 TGB Annual Report.doc

Add to Reading List

Source URL: tgb.iowa.gov

Language: English - Date: 2013-02-19 14:55:28
547Data privacy / Security / Privacy law / Application security / OWASP / Health Insurance Portability and Accountability Act / Web application security / Solicitation / Vulnerability / Computer security / Law / Ethics

Procurement Department 2 Space Drive • Taylors, SC[removed] • ([removed] • Fax[removed]The School District of Greenville County July 31, 2014

Add to Reading List

Source URL: www.greenville.k12.sc.us

Language: English - Date: 2014-07-31 09:51:57
548Computing / Software testing / Application security / Application firewall / Vulnerability / Antivirus software / Web application security / OWASP / Zero-day attack / Computer security / Computer network security / Cyberwarfare

DATASHEET Trend Micro™ DEEP SECURITY for WEB APPS Intelligent Detection and Protection for Web Applications

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-06-16 00:12:30
549Networks / World Wide Web / Load balancing / Network management / Routing / Denial-of-service attack / Content delivery network / Hypertext Transfer Protocol / Application firewall / Computing / Concurrent computing / Computer network security

Enterprise plan overview CloudFlare overview Highlights CloudFlare protects, speeds up, and improves availability for a website or mobile

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-10-07 20:14:59
550Cryptographic software / Cross-platform software / Nginx / Reverse proxy / RC4 / OpenSSL / AES instruction set / Advanced Encryption Standard / Transport Layer Security / Cryptography / Software / Computing

NGINX SSL Performance NGINX SSL Performance NGINX is commonly used to terminate encrypted SSL and TLS connections on behalf of upstream web and application servers. SSL termination at the edge of an application reduces t

Add to Reading List

Source URL: nginx.com

Language: English - Date: 2014-07-29 10:26:45
UPDATE