Web application security

Results: 759



#Item
61Enterprise application integration / Architectural pattern / Web services / Thomas Erl / Information technology governance / Service-oriented architecture / SOA governance / SOA Security / Professional certification / Microsoft Azure / Service-orientation

The Prentice Hall Service Technology Series from Thomas Erl With over 200,000 electronic and print copies, the Prentice

Add to Reading List

Source URL: arcitura.com

Language: English - Date: 2015-12-01 23:32:29
62Computer network security / Software testing / Computer security / Hacking / OWASP / Penetration test / Vulnerability / Web application security / HP Application Security Center

Statement of Information Security Assessment May 2016 CosmoLex Cloud LLC 201 No. Center Drive North Brunswick NJ 08902

Add to Reading List

Source URL: www.cosmolex.com

Language: English - Date: 2016-06-02 13:51:42
63Crime prevention / Cryptography / Information governance / National security / Cybercrime / Email / Graduate school / Student financial aid in the United States / Computer security

Women In Defense, A National Security Organization HORIZONS Scholarship 2111 Wilson Boulevard, Suite 400  Arlington, VAFax  Web site http://wid.ndia.org Application must be typed and comple

Add to Reading List

Source URL: wid.ndia.org

Language: English - Date: 2016-03-07 12:46:28
64MySQL / Cross-platform software / Hacking / Hypertext Transfer Protocol / MariaDB / PhpMyAdmin / Cross-site request forgery / Cross-site scripting / Session fixation / HTTP cookie / Session hijacking / JavaScript

phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2016-06-06 10:06:22
65Computer network security / Computer security / Software architecture / Data security / Web application security / Firewall / Application security / Web application / Application firewall / Application server

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
66Enterprise application integration / Information technology governance / SOA governance / SOA Security / Web services / Architectural pattern / Service-oriented architecture / Thomas Erl

SOA Certified Professional (SOACP) Certification Matrix Use this matrix to map exam requirements to certification tracks. These views can help you plan certification paths and discover how exams that you have passed m

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2015-12-02 17:52:00
67New media / Password / Security / Educational technology / Internet / Web application / Mobile security

SECONDARY CYBERWISE CYBER I 3 THINGS TO REMEMBER

Add to Reading List

Source URL: www.learningexchange.nsw.edu.au

Language: English - Date: 2015-05-06 23:45:12
68Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
69Ajax / JavaScript / Web development / Scripting languages / JQuery / JSON / HTTP cookie / XMLHttpRequest / ECMAScript / Document Object Model / Web application / JavaScript syntax

Semantics and Security Issues in JavaScript Sémantique et problèmes de sécurité en JavaScript Deliverable Resilience FUI 12: Failles de sécurité en JavaScript / JavaScript security issues

Add to Reading List

Source URL: rmod.inria.fr

Language: English - Date: 2015-11-03 10:16:28
70Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Application firewall / Information security / Web application firewall / Michigan State University / SQL injection / Vulnerability

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-02 12:16:23
UPDATE