IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL InjectionReports
 
How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.

Beyond the Firewall: Protection and Performance
sponsored by Akamai Technologies
WHITE PAPER: Access this exclusive paper that explains how to achieve greater visibility into the global threat landscape and create a more proactive resilient defense against cyberattackers. Additionally, find out how to address the challenge of a changing defense budget in the next few years.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Protect Your Business from DDoS and Web Application Attacks
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

Magic Quadrant for Application Security Testing
sponsored by Veracode, Inc.
ANALYST REPORT: Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013

Veracode, Inc.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement