IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
 
The Top 5 Security Goal Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource distills the reports and opinions of 300 IT decision-makers into a realistic picture of the current state of software security in enterprises across a range of industries.
Posted: 06 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores the option of whitelisting, dissecting its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Application Control: Monitoring, Visibility and More
sponsored by Viewfinity
WEBCAST: This webcast discusses integrated and multifaceted methods of keeping business applications safe.
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

Viewfinity

The Service Innovation Mandate in Telecommunications
sponsored by CA Technologies.
WHITE PAPER: This paper provides an overview of the key strategies telecommunications companies can pursue in order to most fully capitalize on the opportunities afforded by APIs. Read on to learn more.
Posted: 11 Nov 2014 | Published: 31 Oct 2014

CA Technologies.

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE: Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015

Veracode, Inc.

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: View this webcast to learn how to weave security into development operations to bridge the gap between the two teams. Watch now to learn how to move from a waterfall to an agile strategy when developing and securing code.
Posted: 27 Feb 2015 | Premiered: Nov 19, 2014

Veracode, Inc.

App Security: Going Beyond Scanning and Remediation
sponsored by Veracode, Inc.
WHITE PAPER: This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.
Posted: 24 Feb 2015 | Published: 09 Jul 2014

Veracode, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement