API Security

Results: 194



#Item
41

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
    42

    API Security PHP|TekRob Richards

    Add to Reading List

    Source URL: cdatazone.org

    - Date: 2012-05-25 12:03:39
      43Mobile technology / Mobile telecommunications / Mobile commerce / Consumerization / Mobile phone / API Management / Cloud computing / Smartphone / Payment Card Industry Data Security Standard / Technology / Electronic commerce / Payment systems

      The Consumerization of Retail Securing Payments with APIs The 21st century has brought a paradigm shift to retail—no longer were traditional brick and mortar and mail-order catalogs good enough. Retail was forced to su

      Add to Reading List

      Source URL: www.ca.com

      Language: English - Date: 2015-02-03 10:29:45
      44Software / API Management / OAuth / Cloud computing / Windows Vista / Cloud API / Generic Security Services Application Program Interface / Computing / Application programming interfaces / Centralized computing

      API Security: A Guide To Securing Your Digital Channels © Akana, All Rights Reserved | Contact Us | Privacy Policy

      Add to Reading List

      Source URL: www.ciosummits.com

      Language: English - Date: 2015-03-18 11:23:36
      45HTTP / Computer crimes / Computer network security / Internet ethics / Cross-site request forgery / HTTP cookie / Phishing / Internet privacy / JavaScript / Software / Computing / Google Chrome

      All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-21 13:48:10
      46Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

      CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2008-04-27 09:57:39
      47Real Estate Transaction Standard / Software architecture / Web application / Web development

      RESO Web API Security Position and Business Case(s) Matthew McGuire – Senior Software Engineer, CoreLogic Summary

      Add to Reading List

      Source URL: reso.memberclicks.net

      Language: English - Date: 2014-11-06 14:46:36
      48Incident management / Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / American Petroleum Institute / Application programming interface / National Incident Management System / ISO / Management / Emergency management / Public safety

      Recommended Practice for Pipeline Emergency Preparedness and Response API RECOMMENDED PRACTICE 1174 FIRST EDITION, [Insert First Edition Date Here] FOR BALLOT REVIEW, V8, April 28, 2015

      Add to Reading List

      Source URL: ballots.api.org

      Language: English - Date: 2015-04-29 14:16:45
      49Technical communication / Security token / Application programming interfaces

      Zoompf API Developer Guide API Version 1.0 Revision History May 9, 2013 – Document Created Introduction

      Add to Reading List

      Source URL: zoompf.com

      Language: English - Date: 2013-07-26 19:43:02
      50Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

      PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

      Add to Reading List

      Source URL: it.akamai.com

      Language: English - Date: 2013-10-01 04:06:01
      UPDATE