IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowsWhite Papers (View All Report Types)
 
HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Addressing the Scalability Challenge of Application Security with Veracode
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper, discover a simpler, more scalable approach to application security across your entire infrastructure -- including web, mobile, and third-party apps. Read now to learn how this cloud-based platform helps overcome five common security challenges.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Veracode, Inc.

API Management: Choosing the Right Tools
sponsored by CA Technologies.
WHITE PAPER: Making application programming interfaces (APIs) available to the general public brings with it a number of challenges and risks. In this white paper, explore the functional and operational requirements in depth and get the key criteria you need to choose the right API management tool for your organization.
Posted: 10 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Application Security 101
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a guide to modern application security with a focus on why software development teams should be trained in secure development techniques.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Veracode, Inc.

Enhance End-User Productivity While Keeping your Apps and Files Secure
sponsored by NComputing
WHITE PAPER: This exclusive whitepaper details a product that can help you increase end-use productivity while keeping your application and files secure in the increasingly mobile business landscape.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NComputing

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

A How‐to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement