IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowReports
 
Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

TicketNetwork Selects SecureSphere to Secure Transactions
sponsored by Imperva
CASE STUDY: This white paper highlights a quick-to-deploy Web application firewall that offers the scalability needed to handle a large number of online transactions, as well as a malicious IP address blocking feature to ensure data access and security.
Posted: 19 Feb 2014 | Published: 31 Dec 2011

Imperva

IBM Acquires Fibrelink to Bloster its Mobile First Portfolio
sponsored by IBM
WHITE PAPER: This informative white paper discusses how the mobile management trend is shifting away from simply "managing the device" and moving instead towards all-encompassing solutions suites that provide management for applications, data, analytics, and security.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

IBM

Analyst Report: Addressing the Complexities and Growing Requirements of the Future
sponsored by IBM
ANALYST REPORT: As mobile device adoption gains traction for personal usage, it's also becoming increasingly popular in the workplace. In response, enterprises must develop strategies for managing the inherent complexity of these new devices in order to improve productivity and optimize performance, while also protecting data and maintaining security.
Posted: 15 Jan 2014 | Published: 31 Oct 2012

IBM

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents as 7-step guide to help you prepare for and prevent these motivated threats.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Best practices in delivery of next generation Automotive Infotainment Systems
sponsored by IBM
WEBCAST: In the realm of next-generation automative infotainment systems, innovation continues to grow exponentially, with new system features creating both trends and challenges. In this informative webcast, discover next-generation automative infotainment systems best practices and learn how the ever-increasing complexities can be simplified.
Posted: 26 Mar 2014 | Premiered: Mar 26, 2014

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Legacy Application Migration to the Cloud and Security
sponsored by IBM
ESSENTIAL GUIDE: Access this resource to gain expert advice on how to plan ahead for a secure migration of legacy applications to the cloud.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

IBM

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement