IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site ScriptingWhite Papers (View All Report Types)
 
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER: The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

The Economic Impact of AdvancedPersistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the financial impact of advanced persistent threats by detailing the results of a study of 755 IT and IT security practitioners.
Posted: 20 Nov 2014 | Published: 13 May 2014

IBM

The Weather Channel Uses Fast IT to Harness Data
sponsored by Cisco Systems, Inc.
WHITE PAPER: Download this white paper to learn how The Weather Company rebuilt their data platform to transition from a cable network to a digital media company. By moving forecasting to the cloud, The Weather Company ingests and analyses data through a rich set of API allowing them to predict weather in 2.8 billion locations 15 times an hour.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Best Practices in Desktop Virtualization
sponsored by Dell
WHITE PAPER: Access this white paper to discover everything you need to know about client virtualization to help you determine which approach to client virtualization makes the most sense for your organization.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

EMC IT: Leading the Transformation
sponsored by EMC
WHITE PAPER: Check out this research to learn which methods organizations are using to reap the benefits of cloud computing. You'll also examine how one IT approach allows you to transform IT, your organization, and the role of employees in the organization through virtualization, hybrid cloud, and IT-as-a-Service.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

EMC

Achieving Control Over Data Center Implementations and Operations
sponsored by Avocent
WHITE PAPER: Access this white paper to learn how certain data center management solutions can provide both access control and holistic monitoring services to ensure reliable, secure, and cost effective data center implementations.
Posted: 24 Nov 2014 | Published: 31 Jul 2010

Avocent
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement