IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowWhite Papers (View All Report Types)
 
Successful Application Security Testing for Agile Development
sponsored by Veracode, Inc.
WHITE PAPER: Find out how one leading vendor is working to provide only the best coding practices and application security testing, so businesses like you can make sure your applications are safe and secure.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Veracode, Inc.

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Delivering Secure SaaS Solutions
sponsored by Veracode, Inc.
WHITE PAPER: Find out how one vendor is designing, implementing, maintaining and auditing security in every layer of their cloud-based services to make sure their customers are happy and their mission-critical, confidential applications remain safe.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Veracode, Inc.

Secure Mobile Access to Corporate Applications
sponsored by F5 Networks
WHITE PAPER: This exclusive paper discusses how your organization can keep access to mobile business applications secure, analyzing a solution that provides benefits such as user authentication, SSO capability, and saving credentials.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

F5 Networks

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement