IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site ScriptingWhite Papers (View All Report Types)
 
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER: The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

The Total Economic Impact Of INetU’s Managed Server And Infrastructure Hosting
sponsored by INetU Inc.
WHITE PAPER: This resource examines the total economic impact and the real-world value of INetU's Managed Hosting services. You'll also get better insight into how this solution allows you to manage your networking and server environments so that you can focus on using the system data to run your day-to-day operations, improving efficiency and capaci
Posted: 30 Oct 2014 | Published: 28 Jun 2013

INetU Inc.

Shell Eco-marathon Widens its Horizons
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study covers how Shell Eco-marathon now allows organizers to explore and serve data quickly and efficiently to improve event management.
Posted: 28 Oct 2014 | Published: 31 Aug 2014

Hewlett-Packard Company

DDoS Mitigation And DNS Availability Should Be Key Components of Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores an in-depth Forrester survey of 245 IT professionals from enterprises in the US and UK, looking at how they deal with DDoS and DNS security.
Posted: 22 Oct 2014 | Published: 12 Dec 2013

Verisign, Inc.

Scale your server to suit your needs
sponsored by IBM
WHITE PAPER: IBM Power Systems do not let you pay for unused server capacity. The server runs to its full potential so your business can operate with agility.
Posted: 22 Oct 2014 | Published: 30 Sep 2014

IBM

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement