IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection White Papers (View All Report Types)
 
Evaluating Your Application Portfolio: 5 Key Steps
sponsored by CAST Software
WHITE PAPER: As your company grows, how can you decide which applications to keep, merge, or retire? This resource reveals 5 key steps to evaluate your application portfolio. Discover how you can mitigate software risks, reduce maintenance costs, optimize agility for resource allocation, and more.
Posted: 11 May 2016 | Published: 11 May 2016

CAST Software

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Know Your Code: Don't Get Blindsided by Open Source Security Risks During Development
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you the advantages and disadvantages of using open source software and how you can avoid some of the disadvantages. Access this resource now for considerations your organization should know.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

How to Unleash the Full Potential of Linux with Docker Containers
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to achieve the ultimate flexibility for business critical Linux applications with Docker containers. Read on to take advantage of enterprise-grade automation, orchestration, management, visibility, and control capabilities for the application development and deployment process.
Posted: 01 Mar 2016 | Published: 31 Aug 2015

IBM

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

Security Analysis: Mobile Dating Apps Vulnerabilities and Risks to Enterprises
sponsored by IBM
WHITE PAPER: Why should you be paying attention to personal apps used on corporate devices? Get an understanding of which applications are vulnerable to attacks and take action to blacklist at-risk applications from running on a device with corporate data.
Posted: 04 May 2016 | Published: 01 Feb 2015

IBM

13 Questions You Must Ask Your Bot Mitigation Vendor
sponsored by Distil Networks
WHITE PAPER: Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement