ComputerWeekly.com Research Library

Powered by Bitpipe.com

HTTPS Research

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: Logicalis

    This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • Niksun NetDetectorLIVE Data Sheet

    Sponsored by: NIKSUN

    NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.