IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Web-based Application SecurityWhite Papers (View All Report Types)
 
Accelerating Web Applications: 3 Essential Principles
sponsored by F5 Networks
WHITE PAPER: This webcast gives tips on how organizations can accelerate their web applications by sending less data, sending data less frequently, and sending it more efficiently.
Posted: 23 Oct 2014 | Published: 30 Jun 2014

F5 Networks

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Accelerating Web Applications: 3 Essential Principles
sponsored by F5 Networks
WHITE PAPER: This webcast gives tips on how organizations can accelerate their web applications by sending less data, sending data less frequently, and sending it more efficiently.
Posted: 31 Jul 2014 | Published: 30 Jun 2014

F5 Networks

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

Next Generation Web Application Firewalls (NG-WAF)
sponsored by Imperva
WHITE PAPER: This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Integrating IBM WebSphere Portal and IBM Mashup Center Software
sponsored by IBM
WHITE PAPER: This white paper outlines the potential integration options between IBM WebSphere® Portal and IBM Mashup Center software. Organizations can implement these integration options to achieve greater flexibility while lowering costs.
Posted: 17 Aug 2010 | Published: 06 Mar 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement