IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).URL manipulation can be employed as a convenience by a Web server administrator, or for nefarious purposes by a hacker. An example of the constructive use of this technique is allowing an Internet user to access  … 
Definition continues below.
Internet Security White Papers (View All Report Types)
1 - 25 of 133 Matches Previous Page  |  Next Page
DX.com Achieves Immediate Results in Fraud Control
sponsored by CyberSource
WHITE PAPER: Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

CyberSource

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Robust Payment Security Builds Customer Confidence in your Brand
sponsored by CyberSource
WHITE PAPER: Frictionless payment transactions are key to your competitive advantage. Discover ways to avoid the costly risks of storing sensitive payment data by using various credential-based payment models.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

CyberSource

Online Fraud Benchmark Report
sponsored by CyberSource
WHITE PAPER: To advance the industry's management of online fraud and business optimization, this report examines the online and mobile fraud landscape in Australia. Learn what 197 business professionals who make fraud management decisions had to say about this market and how it affects selling goods or services online.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

CyberSource

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

How Traditional Firewalls Fail Today’s Networks — And Why Next-Generation Firewalls Will Prevail
sponsored by Dell Software
WHITE PAPER: Access this white paper to explore where traditional firewalls fall short, and how next-generation firewalls can close those security gaps.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

The Top Email Data Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This webinar examines common risks you may come across with Office 365. View now to explore the state of email threats, and how to augment your Office 365 deployment with proper protection strategies.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: Technology alone won't stop phishing attacks; empowering employees to prevent incidents is critical. Uncover ways to boost this level of security awareness, and help users protect themselves and the enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

Give your connections a boost.
sponsored by Verizon
WHITE PAPER: Never before has there been a greater need for performance-based solutions that offer the support for today's IP applications. Access this fact sheet to see how you can realize agile Internet connections that provide the speed your business needs.
Posted: 13 May 2016 | Published: 30 Sep 2015

Verizon

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

The Internet of Things in the Enterprise Report: Executive Summary
sponsored by OpenDNS
WHITE PAPER: In this IoT report, take a closer look at the 7 key findings about IoT devices, connectivity, and infrastructure. Access now and learn what you can do to protect your organization.
Posted: 09 Oct 2015 | Published: 29 May 2015

OpenDNS

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015

IBM

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

TSL/SSL: Best Practices and Applications
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this white paper, explore how TLS works and the 14 best practices for its use. View now to learn why a trusted Certificate Authority is needed and more.
Posted: 02 Apr 2015 | Published: 02 Jan 2014

Symantec Website Security Solutions

SSL for Apps: Best Practices for Developers
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Phishing Tactics
sponsored by Symantec Website Security Solutions
WHITE PAPER: This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Posted: 12 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Website Security Solutions

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise
1 - 25 of 133 Matches Previous Page    1 2 3 4    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  a Web site that has a complicated URL by entering a simpler URL into the address bar of a Web browser. The URL manipulation redirects the request so the user does not have to remember, manually enter, or meticulously cut and paste a long, arcane character string. An example of malicious URL manipulation is its implementation, without the knowledge of the affected server administrator or Internet user, for the purpose of redirecting user requests from a legitimate site to an illegitimate site. The bogus site may then install rogue code on the user's hard drive.URL manipulation differs from URL … 
Internet Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement