Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Internet Browsers

RSS Feed    Add to Google    Add to My Yahoo!
Internet BrowsersReports
 
Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Application programming interface (API), a technology for integrating applications using Web technology. This white paper identifies threats, both old and new, and provides clear solutions to address them.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

CA Technologies.

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

jQuery on Rails (The Real Ones)
sponsored by The Ajax Experience
PODCAST: The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users.
Posted: 15 Jan 2009 | Premiered: Jan 7, 2009


Browser based access to Windows applications and desktops – AccessNow by Ericom
sponsored by Ericom Software
TRIAL SOFTWARE: Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device.
Posted: 28 Oct 2011 | Premiered: 28 Oct 2011

Ericom Software

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012


Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement