IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection White Papers (View All Report Types)
 
Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

WAF or IPS - Why You Need More Than a Firewall and IPS to Protect Your Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Unlock the value of BYOD: Go mobile without sacrificing security
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Why Mobile Needs A Four-Tier Engagement Platform
sponsored by Kony
WHITE PAPER: Access this in-depth Forrester research report to discover why mobile needs a four-tier engagement platform. Read on to discover the 4 steps to take toward the four-tier engagement architecture.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

Kony

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Heighten Security and Improve Availability With an Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement