IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 
Definition continues below.
Web Application Security Reports
201 - 225 of 234 Matches Previous Page  |  Next Page
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by Intel Security
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

Intel Security

15 Minutes to a Secure Business: Daily Practices for IT Security Management
sponsored by Intel Security
PRODUCT LITERATURE: Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

Intel Security

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite
sponsored by Intel Security
PRODUCT LITERATURE: Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

Intel Security

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys

Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Information Security Magazine

Rational® AppScan® Standard Edition V7.8
sponsored by IBM
TRIAL SOFTWARE: Rational® AppScan® Standard Edition V7.8 automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER: This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

NAV CANADA Takes Advantage of IBM Rational AppScan Software to Address the Security and Compliance of Its Online Applications
sponsored by Logicalis
CASE STUDY: NAV CANADA helped enhance the security of its Web applications through best practices such as regular scanning and testing for vulnerabilities throughout the software development lifecycle.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Dell and Microsoft Windows Server 2008
sponsored by Dell, Inc.
BROCHURE: Windows Server 2008 is designed to provide increased reliability and control over your server infrastructure.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell, Inc.

Quicktour Demo: Key Differentiators between Microstrategy and Business Objects
sponsored by MicroStrategy Incorporated
WHITE PAPER: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Business Objects.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

MicroStrategy Incorporated

Move Web Application Security Testing into Your Development Cycle
sponsored by IBM
WHITE PAPER: This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

IBM

Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development.
sponsored by IBM
WHITE PAPER: This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

IBM

Effectively Managing High-Performing, Business-critical Web Applications
sponsored by CA Technologies.
WHITE PAPER: This paper details a reliable high-performance web applications services environment that ensures the end user's ability to successfully interact with web applications while enabling it to meet service level Agreements (SLAs).
Posted: 24 Sep 2008 | Published: 24 Sep 2008

CA Technologies.

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

The IBM Rational AppScan Lifecycle Solution
sponsored by IBM
BROCHURE: IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
Posted: 29 Jul 2008 | Published: 01 Jan 2007

IBM

Trial download: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: Download this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.
Posted: 29 Jul 2008 | Premiered: 29 Jul 2008

IBM

WebSphere Application Server Feature Pack for Web 2.0
sponsored by IBM
WHITE PAPER: This white paper explores methods for improving the development of Ajax-based applications and Web 2.0 to SOA connectivity.
Posted: 10 Jun 2008 | Published: 10 Jun 2008

IBM

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

BIG-IP Application Security Manager™
sponsored by F5 Networks
HARDWARE LISTING: The BIG-IP Application Security Manager delivers the industry's most comprehensive application delivery security solution with the option to deliver both applications together. Read this white paper to learn how this can benefit your company.
Posted: 28 Apr 2008 | Published: 01 Jan 2007

F5 Networks

Application Delivery Controller Performance Report
sponsored by F5 Networks
WHITE PAPER: This report documents the performance of the top Application Delivery Controllers offered by F5 Networks, Cisco Systems, and Citrix Netscaler. Through the development and implementation of robust and reproducible testing methods, F5 demonst...
Posted: 28 Apr 2008 | Published: 01 Jan 2007

F5 Networks

Enterprise Remote Access
sponsored by F5 Networks
WHITE PAPER: Historically, organizations have used IPSec VPN solutions to provide employees with remote access to network resources; an expensive, complicated deployment for a handful of users. This paper details how this process has modernized.
Posted: 28 Apr 2008 | Published: 01 Sep 2005

F5 Networks

Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008

Imperva
201 - 225 of 234 Matches Previous Page    7 8 9 10    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  can run JavaScript hosted on a different domain. For example, in a Web-based e-mail application that uses Ajax, an attacker can log in as the legitimate user. All of the contents of the e-mail inbox and address book then become available to the hacker. In addition, the hacker may send bogus e-mail messages in the name of the victim.Ajax is a method of building interactive Web applications by combining several programming tools including JavaScript, which can cause a linked-to page to appear (or fail to appear) in a pop-up, hide the status bar, change text in the status bar, change text or graphics … 
Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement