Web applications

Results: 4002



#Item
331

2014 MAP-APP COMPETITION WINNERS The Map-App Design Competition illustrates both the importance of design for the visual display of cartographic data from a GIS and highlighted web-based mapping applications. Paper maps

Add to Reading List

Source URL: tugisconference.com

- Date: 2015-03-18 16:09:25
    332

    Chapter 12: Supporting User Login Many web sites and web applications limit access based on a user. We will demonstrate this functionality by identifying some functionality that is available only to registered users. 1.

    Add to Reading List

    Source URL: seaside.gemtalksystems.com

    Language: English - Date: 2013-06-20 13:20:13
      333Computing / Software engineering / Computer security / Web development / Internet privacy / Scripting languages / Hypertext Transfer Protocol / Computer network security / HTTP cookie / Cross-site scripting / Cross-site request forgery / Dynamic web page

      WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

      Add to Reading List

      Source URL: www.abortz.net

      Language: English - Date: 2016-01-16 18:17:58
      334

      Securing Enterprise Web Applications at the Source: An Application Security Perspective

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:43:28
        335

        Exposing Private Information by Timing Web Applications Andrew Bortz Dan Boneh

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2010-06-04 16:24:15
          336

          Secure Session Management With Cookies for Web Applications Chris Palmer <> iSEC Partners, Inc 444 Spear Street, Suite 105 San Francisco, CA 94105

          Add to Reading List

          Source URL: noncombatant.org

          Language: English - Date: 2013-09-21 21:26:26
            337Cloud infrastructure / Cloud applications / System administration / Cloud Computing / Cloud Computing Security / Threat Stack / Docker / Amazon Elastic Compute Cloud / Computer security / Vulnerability / Amazon Web Services

            TH RE AT STA CK C LO UD SE C UR ITY P L AT FO RM T M PRO EDITION Integrate with your process. Our Pro edition provides the ultimate experience and flexibility in workload security.

            Add to Reading List

            Source URL: www.threatstack.com

            Language: English - Date: 2016-03-16 05:37:16
            338

            What is Digital Performance Management (DPM)? DPM is a proactive, data-centric approach to performance management where web and mobile applications are continuously measured, tested, and optimized to deliver the best pos

            Add to Reading List

            Source URL: www.soasta.com

            Language: English - Date: 2016-03-21 20:50:45
              339

              Automated Functional Testing based on the Navigation of Web Applications Boni García - Juan Carlos Dueñas Universidad Politécnica de Madrid (Spain)

              Add to Reading List

              Source URL: rap.dsi.unifi.it

              Language: English - Date: 2011-06-09 13:02:30
                340Application programming interfaces / Cloud computing / Cloud applications / Technical communication / Mobile backend as a service / Web API / IBM API Management / Cloud API

                FioranoAPIConnect_DataSheet_Web.cdr

                Add to Reading List

                Source URL: www.fiorano.com

                Language: English - Date: 2015-07-08 05:40:27
                UPDATE