ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Mobilizing Windows Applications

    Sponsored by: Citrix

    This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.

  • Defend Against Injection-based Attacks

    Sponsored by: Klocwork

    This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.

  • Challenging Some of the Myths About Static Code Analysis

    Sponsored by: Klocwork

    This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.

  • Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks

    Sponsored by: Palo Alto Networks

    In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.

  • Cloud Based Application Penetration Testing Trial

    Sponsored by: iViZ

    Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.

  • BMC Release Lifecycle Management

    Sponsored by: BMC Software

    This whitepaper covers a solution that will help ease your management of complex web applications and reduce the risks of failure.

  • Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.

  • EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    Sponsored by: IBM

    Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.

  • Cisco Any Device: Planning a Productive, Secure and Competitive Future

    Sponsored by: Cisco

    Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.

  • Legacy Application Migration to the Cloud and Security

    Sponsored by: TechTarget Security

    Access this resource to gain expert advice on how to plan ahead for a secure migration of legacy applications to the cloud.

  • Endpoint Security IT Decision Center Handbook 2

    Sponsored by: TechTarget Security

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

  • Mobilizing Windows Apps

    Sponsored by: Citrix

    This white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.

  • Mobile Security Insider's Edition

    Sponsored by: TechTarget Security

    This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.

  • Why You Need A Next-Generation Firewall

    Sponsored by: Hewlett Packard Enterprise

    This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.

  • SAP platform showdown

    Sponsored by: IBM

    In this informative study, find out the real-word impact of deploying SAP on IBM's Power platforms, as opposed to SAP on HP x86, Dell x86 and HP Itanium, all running with Oracle DB.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Analyst advice for IT security leaders

    Sponsored by: IBM

    Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.

  • Course: Improper Validation of Array Index (CWE-129)

    Sponsored by: Klocwork

    This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

  • Course: Insecure Temporary Files (CWE-377)

    Sponsored by: Klocwork

    This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

  • Next-Generation Security for Today's Data Center

    Sponsored by: IBM and Juniper

    This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.

  • Securing Enterprise Applications

    Sponsored by: IBM and Juniper

    This informative resource discusses a comprehensive set of application security solutions that provide highly effective security services for applications on your network, mobile devices, and even in the cloud.

  • Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)

    Sponsored by: Klocwork

    Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • Exposing the Beast - Custom API Mgt for the Enterprise

    Sponsored by: Intel Corporation

    In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.

  • The Evolution of Server Load Balancing

    Sponsored by: Radware

    This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.