Web application firewall

Results: 183



#Item
11Veracode Runtime Protection

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
12CASE STUDY  Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
13Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
14Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
15Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:43
16Quick Reference Guide to PCI DSS 3.0 PCI DSS is the PAYMENT CARD INDUSTRY DATA SECURITY STANDARD. It is the information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and P

Quick Reference Guide to PCI DSS 3.0 PCI DSS is the PAYMENT CARD INDUSTRY DATA SECURITY STANDARD. It is the information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and P

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:13
17ShapeAdvancedAppDefense_DataSheet

ShapeAdvancedAppDefense_DataSheet

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:28
18Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
19Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
20CASE STUDY  Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-02 12:16:23