Security Guide For ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Guide For Application returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Social Networks and Community Management
 •   Security Policies
 •   Firewalls
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Web Services
 •   Data Center Management

Related Searches
 •   Application Of Security
 •   Licenses Security Guide
 •   Measured Security
 •   Metrics Security Guide For
 •   Prices Security Guide
 •   Security Guide Cases
 •   Security Guide For Address
 •   Security Guide Guidelines
 •   Security Java
 •   Security Michigan
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Next Generation Network Security Guide by TechTarget

March 19, 2014 - (Free Research)
Mobile devices are exploding in enterprises everywhere. Unfortunately, managing this dynamic world of communication is complex and daunting. This guide showcases how to deploy network security devices and how to avoid deployment failures. 
(RESOURCE)

HyTrust, VMware, Intel® Cloud Builders Enhanced Cloud Security Guide by Intel

August 22, 2011 - (Free Research)
This white paper describes the current threat landscape and recommends a reference architecture designed to minimise the risks of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 04, 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK) READ ABSTRACT |

Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking by AVG Technologies USA, Inc.

November 05, 2010 - (Free Research)
This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 29, 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 19, 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide: Configure Outbound Firewall Rules for Data Protection by SearchSecurity.com

August 24, 2012 - (Free Research)
A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business. 
(EGUIDE) READ ABSTRACT |

E-Guide: Best practices for pen testing Web applications by SearchSecurity.com

October 24, 2011 - (Free Research)
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls. 
(EGUIDE) READ ABSTRACT |

Technical Guide on SIM: Moving beyond network security toward protecting applications by SearchSecurity.com

December 20, 2011 - (Free Research)
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs. 
(EGUIDE) READ ABSTRACT |

Information Security Essential Guide: Strategies for Tackling BYOD by SearchSecurity.com

May 31, 2013 - (Free Research)
Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Your Guide to Mobile Application Management by SearchSecurity.com

October 19, 2012 - (Free Research)
This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control. 
(EGUIDE) READ ABSTRACT |

A Guide to MAM and Planning for BYOD Security in the Enterprise by SearchSecurity.com

November 26, 2012 - (Free Research)
In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise. 
(EGUIDE) READ ABSTRACT |

E-Guide: Key Considerations for Creating a Hybrid Cloud by SearchDataCenter.com

March 23, 2011 - (Free Research)
In this e-guide from SearchCloudComputing.com, discover key considerations for creating a hybrid cloud for your organization. Learn why it is important to keep in mind data security, hypervisor usage, and cloud management. Also, find out how to identify applications that can be moved to the public cloud to optimize capacity in the private cloud. 
(EGUIDE) READ ABSTRACT |

E-Guide: Cloud computing security - Infrastructure issues by SearchSecurity.com

May 26, 2011 - (Free Research)
While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy. 
(EGUIDE) READ ABSTRACT |

E-Guide: Shortcut guide to Web application firewall deployment by SearchSecurity.com

September 22, 2011 - (Free Research)
Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment. 
(EGUIDE) READ ABSTRACT |

October Essentials Guide on Mobile Device Security by SearchSecurity.com

October 09, 2012 - (Free Research)
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

A How‐to Guide to OAuth & API Security by CA Technologies.

December 31, 2013 - (Free Research)
When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Integrating security into the ALM lifecycle by IBM

November 21, 2011 - (Free Research)
In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management. 
(EGUIDE) READ ABSTRACT |

E-Guide: Integrating security into the ALM lifecycle by IBM

November 16, 2011 - (Free Research)
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management. 
(EGUIDE) READ ABSTRACT |

E-Guide: Expert insights to application security testing and performance by IBM

November 11, 2011 - (Free Research)
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle. 
(EGUIDE) READ ABSTRACT |

E-Guide: Best Practices for Developing Secure Applications by IBM

November 10, 2010 - (Free Research)
This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security. 
(EGUIDE) READ ABSTRACT |

CW Buyers Guide To Finance and Insurance by ComputerWeekly.com

February 04, 2014 - (Free Research)
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Essential Guide to PCI DSS by Information Security Magazine

September 14, 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Writing secure SQL database code by IBM

May 26, 2011 - (Free Research)
When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts