IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection White Papers (View All Report Types)
 
The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

The Real SaaS Manifesto
sponsored by Workday
WHITE PAPER: Learn how best to select and implement SaaS apps for key functions like human capital management and talent management.
Posted: 16 Nov 2017 | Published: 31 Dec 2016

Workday

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement