Article About Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Article About Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Vulnerability Assessment
 •   Security Monitoring
 •   Security Policies
 •   Application Management and Maintenance
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Managed Security Services

Related Searches
 •   Article About Application Costing
 •   Article About Papers
 •   Article About Secure
 •   Article Billing
 •   Article Purchasing
 •   Guideline Article About Application
 •   It Article About Application
 •   Measured Article
 •   Strategic Article About
 •   Training Article About Application
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine

June 10, 2009 - (Free Research)
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. 
(EZINE)

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 10, 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 03, 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Information Security Magazine - September 2009: Readers’ Choice Awards by Information Security Magazine

September 15, 2009 - (Free Research)
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more. 
(EZINE)

Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds by IBM

May 19, 2011 - (Free Research)
This article provides an introduction to IBM® WebSphere® CloudBurst™ and WebSphere Application Server Hypervisor Edition. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Report January 2012: Where are the 419s of Yesteryear? by ESET

February 13, 2012 - (Free Research)
This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Global Threat Trends: October 2010 by ESET

November 10, 2010 - (Free Research)
Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more! 
(WHITE PAPER) READ ABSTRACT |

Tablets and Smartphones in the Enterprise: Risks and Management Concerns by SearchSecurity.com

August 21, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time. 
(EBOOK) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 27, 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Elliptic curve cryptography in transport ticketing by ComputerWeekly.com

May 30, 2014 - (Free Research)
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IT in Europe: Security in the Cloud by SearchSecurity.com

August 26, 2011 - (Free Research)
Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks. 
(EZINE) READ ABSTRACT |

Global Threats Report Dec 2011 by ESET

January 26, 2012 - (Free Research)
The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - October 2009: Security 7 Awards by Information Security Magazine

October 13, 2009 - (Free Research)
The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more. 
(EZINE)

ISM Essentials Guide on Cloud and Virtualization Security by SearchSecurity.com

October 07, 2011 - (Free Research)
Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts. 
(ESSENTIAL GUIDE) READ ABSTRACT |

McAfee Security Journal by McAfee, Inc.

December 2008 - (Free Research)
This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception. 
(WHITE PAPER) READ ABSTRACT |

Disaster Preparedness: Is there a hole in your disaster recovery plan? by Iron Mountain

January 2012 - (Free Research)
Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Report: July 2010 by ESET

August 2010 - (Free Research)
Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat. 
(WHITE PAPER) READ ABSTRACT |

An Introductory Breakdown of Trusted Computing by Intel

December 2008 - (Free Research)
This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level. 
(TECHNICAL ARTICLE)

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

SAPinsider article - Meet the needs of the "Mobile Anywhere" generation by Hewlett-Packard Company

March 2012 - (Free Research)
How do you get started on a mobility project? Access this helpful resource to learn how mobile application services for SAP enable you to easily simplify your applications, extend them where necessary, and build new apps with preconfigured development and security frameworks. 
(WHITE PAPER) READ ABSTRACT |

Getting Ready for Microsoft Windows Server 2008 by Dell, Inc.

April 2008 - (Free Research)
Read this article to learn about the many capabilities and benefits of Microsoft Windows Server 2008 and how Dell products can help simplify the migration to this new operating system. 
(TECHNICAL ARTICLE) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts