IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting White Papers (View All Report Types)
 
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER: The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Drive business growth with mobile workspaces
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about a complete mobile workspace solution that provides all the technologies you need to get started implementing your enterprise mobility strategy today. Also, explore the benefits of having a mobile workspace solution in your organization.
Posted: 31 Jul 2015 | Published: 29 Aug 2014

Citrix

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

How to Deal With a Perfect Storm of Disruption in the Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper features expert advice about what companies in the managed services industry should do to prepare for transformational change in IT.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement