ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cross Site Scripting White Papers

  • Taking Action to Secure Web Applications

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    Sponsored by: SearchSecurity.com

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

  • How to prevent cross-site scripting attacks: Expert tactics

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • The Anatomy of a Cross-Site Scripting Campaign

    Sponsored by: Imperva

    XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Media Consumption Survey 2022

    Sponsored by: ComputerWeekly.com

    Information is a powerful tool for IT decision-makers, and we understand that our readers enjoy consuming media in many different ways. With this in mind, we are trying to gain a better understanding of what content types our readership values the most. By taking this survey, you will help us shape our content around your needs.

  • 2022 ASEAN Salary Survey - Future Work Infographic

    Sponsored by: ComputerWeekly.com

    The results are in for the 2022 Career and Salary Survey. With over 300 respondents who work in the ASEAN IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.