3,091 Results for:Application attacks (buffer overflows, cross-site scripting)

  • Filter by: 

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

sponsored by WhiteHat Security Published: 16 Jan 2018 Video

Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code ...

View Now

Finding Buffer Credit Issues: A Tutorial

sponsored by IntelliMagic Published: 30 Jul 2018 Webcast

This video demonstrates how to identify buffer credit issues with easy-to-follow instructions, including how to look for transmit patterns on the fabric to locate any buffer credit shortages. Tune in to get started.

View Now

Application security testing: Protecting your application and data

sponsored by SearchSecurity.com Published: 07 Nov 2011 eBook

Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of ...

View Now

Linearly Scalable, "Local" Burst Buffer with NVMe

sponsored by Excelero Published: 07 Sep 2018 White Paper

Read this white paper for several methods of building burst buffers for checkpoints, including one that takes advantage of NVMe technology to support large-scale modeling, analysis, simulation, and visualization.

View Now

Pooling NVMe within GPFS NSDs Enables Efficient Burst Buffer

sponsored by Excelero Published: 31 Dec 2017 Case Study

This case study illustrates how SciNet's SLAs are met by using a unified pool of distributed high-performance NVMe as a burst buffer for checkpointing, delivering 230GB/s of throughput and over 20M random 4k IOPS. ...

View Now

JavaScript – 20 Lessons to Successful Web Development

sponsored by ComputerWeekly.com Published: 28 Jul 2015 Book

Robin Nixon gives a practical guide to JavaScript coding in this extract from his book, JavaScript – 20 Lessons to Successful Web Development.

View Now

E-Guide: The dangers of application logic attacks

sponsored by SearchSecurity.com Published: 13 Apr 2011 eGuide

Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb ...

View Now

How a next-generation firewall prevents application-layer attacks

sponsored by SearchSecurity.com Published: 24 Apr 2013 eGuide

The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and...

View Now

Trends in the Cost of Web Application & Denial of Service Attacks

sponsored by Akamai Technologies Published: 30 Sep 2017 Analyst Report

Based on research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application and denial-of-service (DoS) attacks. Read on to learn some of the key findings and ...

View Now

Are Your Defenses Against Web Application Attacks Falling Further Behind?

sponsored by ThreatX Published: 30 Jun 2018 Research Content

Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to ...

View Now