Web application security

Results: 759



#Item
731Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
732

Android Application Security Artem Chaykin Lead Specialist, Web Application Security Team Positive Technologies

Add to Reading List

Source URL: www.ptsecurity.ru

- Date: 2014-03-21 09:38:22
    733Computer security / Security / Crime prevention / National security / Penetration test / Vulnerability / Web testing / Information security / Mobile application development / Software testing / Computer network security / Computing

    Professional Services Market Landscape Our Services Maintaining an in-depth understanding of

    Add to Reading List

    Source URL: www.outpost24.com

    Language: English - Date: 2013-09-06 03:49:25
    734Computing / Software testing / Hacking / Electronic commerce / Vulnerability / Application security / Cross-site scripting / SQL injection / Web application security / Computer security / Cyberwarfare / Computer network security

    WAS™ Vulnerability Management for Web Applications Market Landscape As modern businesses look to web applications to provide services and perform special functions, they simultaneously increase their risk exposure. The

    Add to Reading List

    Source URL: www.outpost24.com

    Language: English - Date: 2013-09-06 03:49:32
    735Computing / Software architecture / ASP.NET / Microsoft Visual Studio / Web application / Software / World Wide Web / Web development

    Case-Study: ehsSUITE - Compliance Management System Background Energy Facility Services offers a wide range of services designed to help companies achieve their environmental, health, safety, and security objectives. To

    Add to Reading List

    Source URL: itcsoftware.com

    Language: English - Date: 2013-08-11 05:34:49
    736Computer networking / Companies listed on the New York Stock Exchange / World Wide Web / Single sign-on / Reverse proxy / Cloud computing security / Cloud computing / McAfee VirusScan / Application firewall / Computing / Computer security / McAfee

    McAfee Web Gateway and McAfee Cloud Single Sign On: A Complementary Approach to Today’s Web Security Challenges Securing the “Everywhere Web” With highly adaptable server-side application capability, and an equall

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-01-10 01:04:24
    737Politics / Early voting / Firewall / Electoral fraud / Backup / Government / Accountability / Data security / Elections / Computer network security

    Ever wish you could manage your poll places from the convenience of your PC or smartphone? CentralPoint ™ is a web-based application that displays, monitors and tracks poll place information in real-time, allowing ele

    Add to Reading List

    Source URL: www.essvote.com

    Language: English - Date: 2014-01-23 16:07:08
    738Cross-platform software / Cryptographic protocols / Extensible Messaging and Presence Protocol / Online chat / Transport Layer Security / Application programming interface / World Wide Web / JavaScript / WebSocket / Computing / Software / Data

    WebRTC School Qualified Developer (WSQD™) program Overview The WebRTC School™ is ‘the’ place to learn all about WebRTC, also known as Web Real-TimeCommunications. There is so much information on the internet abou

    Add to Reading List

    Source URL: www.webrtcschool.com

    Language: English - Date: 2013-09-10 05:27:25
    739Computer hardware / Credit cards / Data privacy / Electronic commerce / Payment Card Industry Data Security Standard / Conventional PCI / Checkbox / Computer buses / Payment systems / Computing

    Retail Optimizer by: David Taylor this is PCI 6.6, related to Web application security, which says you can use a Web application firewall, do a manual code review or use an automated code review tool. Clearly, the cost o

    Add to Reading List

    Source URL: www.retailtechnologyexperts.com

    Language: English - Date: 2009-05-04 18:42:09
    740System software / Application firewall / XML firewall / Firewall / Web Access Management / Load balancing / Armorlogic / Novell Cloud Security Service / Computer network security / Computing / Computer security

    Web Application Firewall Web Services Firewall Web Access Management RELIABILITY, PERFORMANCE AND CONTINUITY

    Add to Reading List

    Source URL: www.bee-ware.net

    Language: English - Date: 2012-07-26 05:35:28
    UPDATE