IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting Reports
 
Taking Action to Secure Web Applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER: The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

How to prevent cross-site scripting attacks: Expert tactics
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

SearchSecurity.com

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement