IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).URL manipulation can be employed as a convenience by a Web server administrator, or for nefarious purposes by a hacker. An example of the constructive use of this technique is allowing an Internet user to access  … 
Definition continues below.
Internet Security Reports
1 - 25 of 210 Matches Previous Page  |  Next Page
Save Your Future Self With Security Now
sponsored by SearchSoftwareQuality.com
EBOOK: Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016

SearchSoftwareQuality.com

CISO's Guide to the Top 7 IoT Risks
sponsored by ForeScout Technologies, Inc.
EGUIDE: As more devices connect to the internet, hackers raise their chances of successfully breaking into an organization. This e-guide gives CISOs defensive strategies to mitigate IoT driven attacks.
Posted: 21 Mar 2016 | Published: 09 Mar 2016

ForeScout Technologies, Inc.

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

Customer-Focused Organizations Must Take A Strategic Approach To “Identity Relationship Management”
sponsored by ForgeRock
WHITE PAPER: Forrester Consulting has evaluated companies' IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Read on and discover why it pays to implement IRM solutions that treat customer identities, and their identity data, as mission-critical for the top line of the business.
Posted: 17 Nov 2015 | Published: 31 Jan 2014

ForgeRock

Identity as a Revenue Generator: Getting Started with Customer-Focused Identity Management
sponsored by ForgeRock
WHITE PAPER: This white paper helps you understand the essentials of customer-focused identity and how it allows you to engage with your customers. Access now and learn best practices for identity management and how you can better engage with your customers.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for the Internet Of Things (IoT)
sponsored by ForgeRock
WHITE PAPER: This white paper describes how to apply identity services based on the underlying device architecture, as well as the native protocols and standards being used. Access now and discover which features play a significant role in applying identity services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

The Internet of Things in the Enterprise Report: Executive Summary
sponsored by OpenDNS
WHITE PAPER: In this IoT report, take a closer look at the 7 key findings about IoT devices, connectivity, and infrastructure. Access now and learn what you can do to protect your organization.
Posted: 09 Oct 2015 | Published: 29 May 2015

OpenDNS

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Cybersecurity Risks Masked by Controversial Vulnerability Counts
sponsored by Symantec Website Security
EGUIDE: In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
Posted: 16 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Corporation

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM
1 - 25 of 210 Matches Previous Page    1 2 3 4    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  a Web site that has a complicated URL by entering a simpler URL into the address bar of a Web browser. The URL manipulation redirects the request so the user does not have to remember, manually enter, or meticulously cut and paste a long, arcane character string. An example of malicious URL manipulation is its implementation, without the knowledge of the affected server administrator or Internet user, for the purpose of redirecting user requests from a legitimate site to an illegitimate site. The bogus site may then install rogue code on the user's hard drive.URL manipulation differs from URL … 
Internet Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement