IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

A How-to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: Access this white paper for a complete breakdown of OAuth and discover how you can make OAuth implementation easy for your enterprise.
Posted: 11 Jun 2015 | Published: 26 Dec 2014

CA Technologies.

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Measure and Move Your Mobile Apps to Greatness
sponsored by IBM
WHITE PAPER: In this exclusive white paper, you will evaluate what turns consumers and other users both off and onto a mobile app, as well as learn how to elevate your serviceable and profitable mobile apps into great apps. Read on to discover four key findings that will elevate your apps.
Posted: 04 Jan 2016 | Published: 31 Oct 2015

IBM

The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015

IBM

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

The Top 8 Best Practices for Deploying XenApp and XenDesktop
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will discover how to improve the security and remote access of your virtual applications and desktops, and moreover access the top 8 best practices for Citrix XenApp/XenDesktop 7.x deployment. Learn how to separate databases for site configuration and logging by reading on now.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

eG Innovations, Inc.

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement