Script Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Script Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Scripting
 •   Vulnerability Assessment
 •   Application Management and Maintenance
 •   Testing and Analysis
 •   Security Monitoring
 •   Application Lifecycle Management(ALM)
 •   Content Delivery Networks/ Web Application Acceleration
 •   Security Policies
 •   Data Security

Related Searches
 •   Desktop Script Application Security
 •   Impacts Of Script
 •   Procedure Script Application Security
 •   Questions Script
 •   Script Application Markets
 •   Script Application Types
 •   Speed Script Application Security
 •   Using Script Application Security
 •   View Script
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

State of Software Security Report by Veracode, Inc.

February 28, 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Maximizing IT Investments: Recession-proofing Your Network by F5 Networks

July 2008 - (Free Research)
This whitepaper outlines a plan that enables network teams to implement a plan that optimizes application performance. It also identifies recession-proof networking technologies and their challenges. 
(WHITE PAPER) READ ABSTRACT |

User Virtualization and Windows 7: Migration, personalization, satisfaction by AppSense

June 2011 - (Free Research)
Windows 7 will soon be the preferred organisational operating system, and the migration could cause difficulty. Read now to discover how user virtualisation will automate the process of migrating and managing thousands of user profiles and endpoint devices. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by Network Automation, Inc

October 2010 - (Free Research)
This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation. 
(WHITE PAPER) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

Expert Insight into Powershell's Scripting by Dell Compellent

September 2011 - (Free Research)
To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management. 
(EGUIDE) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

Rational® AppScan® Standard Edition V7.8 by IBM

March 2009 - (Free Research)
Rational® AppScan® Standard Edition V7.8 automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow. 
(TRIAL SOFTWARE)

Faster Application Development via Improved Database Change Management by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Try Rational AppScan by IBM

November 2009 - (Free Research)
Download Rational® AppScan® Standard Edition V7.9, previously known as Watchfire AppScan, a leading Web application security testing tool that automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow. 
(ASSESSMENT TOOL)

HP LoadRunner Software Tips and Tricks for Configuration Scripting and Execution by Hewlett-Packard Company

August 2008 - (Free Research)
This guide is intended to help new users and seasoned professionals learn new ways to design and implement successful load testing initiatives using HP LoadRunner. 
(ARTICLE) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

Managing Integrated Communications, Consumerization and Security: Best Practices by SearchSecurity.com

June 2012 - (Free Research)
This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users. 
(EGUIDE) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension

February 2014 - (Free Research)
In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS. 
(VIDEO) READ ABSTRACT |

Going Beyond Simple Infrastructure Monitoring with HP SiteScope by Hewlett-Packard Company

August 2010 - (Free Research)
This paper will showcase many advanced capabilities of HP SiteScope software that can enable an enterprise to monitor more of its infrastructure, including Simple Network Management Protocol (SNMP) by management information bases (MIB), network bandwidth, script and enterprise application monitors. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts