IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed    Add to Google    Add to My Yahoo!
XSS White Papers (View All Report Types)
 
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER: The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

How to Create, Deploy, and Operate Secure IoT Applications
sponsored by Telit
WHITE PAPER: According to Gartner, spending on IoT security is expected to reach $547 million in 2018. In this white paper, gain valuable insights on how to create, deploy and operate end-to-end security to help identify and prevent hackers from getting your organizations data through IoT devices.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Telit

6 Steps to Building a Business Case for IT Portfolio Management
sponsored by Mega International
WHITE PAPER: Uncover 6 steps to build a business case for IT portfolio management by examining how it helps your organization beyond just delivering cost savings.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Mega International

Making Data Protection a Centerpiece of IT Transformation
sponsored by Dell EMC and Intel®
WHITE PAPER: This paper looks at how organizations can fortify and future-proof their data protection systems in order to support data center modernization and IT transformation initiatives. Click inside to learn how Dell EMC's Data Domain offers data protection automation can help you achieve that modernization.
Posted: 11 Jan 2018 | Published: 11 Jan 2018

Dell EMC and Intel®

Data Loss Prevention: Best Practices
sponsored by Seqrite
WHITE PAPER: In order to minimize the damage data loss does to your organization, you need a strong data loss protection solution. This white paper details the 3 types of data you need to be securing, as well as some best practices to keep in mind.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite
 
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement