IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowsReports
 
Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Mobile Application Security Survey Results
sponsored by Veracode, Inc.
WHITE PAPER: In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.
Posted: 07 Jul 2014 | Published: 30 Jun 2013

Veracode, Inc.

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Ten Tips for Building a Successful Vendor Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: If you rely on commercial, outsourced, cloud and mobile applications, you need a plan for vendor security compliance. In this resource, get 10 tips for building a successful vendor application security plan.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
WHITE PAPER: View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement