2,461 Results for:Application attacks (buffer overflows, cross-site scripting)

  • Filter by: 

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

sponsored by WhiteHat Security Published: 16 Jan 2018 Video

Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code ...

View Now

Resolving key integration challenges for financial applications

sponsored by SearchFinancialApplications Published: 22 Oct 2012 eGuide

Read this expert e-guide to learn how to improve reference data management to avoid headaches in the financial sector and discover best practices for devising and carrying out a financial management software ...

View Now

The Right Strategy for CFOs to Navigate Financial Application Purchases

sponsored by SearchFinancialApplications Published: 31 Dec 2012 eBook

This expert e-book outlines a complete strategy to help CFOs navigate financial application purchases, from putting the right people in place to combing the market and finding the best price.

View Now

Application security testing: Protecting your application and data

sponsored by SearchSecurity.com Published: 07 Nov 2011 eBook

Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of ...

View Now

How a next-generation firewall prevents application-layer attacks

sponsored by SearchSecurity.com Published: 24 Apr 2013 eGuide

The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and...

View Now

E-Guide: The dangers of application logic attacks

sponsored by SearchSecurity.com Published: 13 Apr 2011 eGuide

Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb ...

View Now

Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

sponsored by Rapid7 Published: 07 Jun 2017 White Paper

In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.

View Now

Stopping application layer DDoS attacks: What you need to know

sponsored by SearchSecurity.com Published: 27 Mar 2012 eGuide

While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected...

View Now

The Confidence Crisis: Protecting Applications Against Data Theft and Bot Attacks

sponsored by Radware Published: 27 Feb 2018 White Paper

68% of retailers lack certainty they could secure credit card data during peak demand periods, according to the National Retail Federation. Take a look at this report to gain insight into protecting applications ...

View Now

JavaScript – 20 Lessons to Successful Web Development

sponsored by ComputerWeekly.com Published: 28 Jul 2015 Book

Robin Nixon gives a practical guide to JavaScript coding in this extract from his book, JavaScript – 20 Lessons to Successful Web Development.

View Now