IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection White Papers (View All Report Types)
 
Open Source Software Support: Top Challenges and Best Practices
sponsored by Rogue Wave Software
WHITE PAPER: This report takes real support data from hundreds of open source software (OSS) packages across different organizations to analyze the statistics, realities, and results of open source in the field. Learn how to provide effective support for OSS by tackling the top challenges identified in the survey's data and uncover 5 OSS support best practices.
Posted: 23 Nov 2016 | Published: 31 Dec 2015

Rogue Wave Software

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Cloud IAM TCO Assessment: How Much Could You be Saving?
sponsored by IBM
WHITE PAPER: This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.
Posted: 07 Nov 2016 | Published: 30 Nov 2016

IBM

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: File sharing is a prevalent problem on corporate networks today. Access this report and you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Secure and Accelerate User Access to Web Applications
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement