ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cross Site Scripting Research

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    Sponsored by: SearchSecurity.com

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

  • Taking Action to Secure Web Applications

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • How to prevent cross-site scripting attacks: Expert tactics

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.

  • The Anatomy of a Cross-Site Scripting Campaign

    Sponsored by: Imperva

    XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  • Cisco Zero Trust

    Sponsored by: Cisco

    Read this paper to learn a comprehensive approach to secure access for your workforce, workloads, and workplace.

  • A Complete Guide for How Organizations Buy Training

    Sponsored by: Global Knowledge

    Save a copy of this guide to learn how to strategically budget and buy training and development programs for your organization, including how to purchase training with vendor credits, take advantage of prepay plans, tuition reimbursements, and more.

  • ThreatQ for Healthcare

    Sponsored by: ThreatQuotient

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.