61![Computer network security / Software testing / Hacking / Cross-site scripting / Vulnerability / Electronic commerce / Web application security scanner / Application security / Application firewall / Computer security / Cyberwarfare / Computing Computer network security / Software testing / Hacking / Cross-site scripting / Vulnerability / Electronic commerce / Web application security scanner / Application security / Application firewall / Computer security / Cyberwarfare / Computing](/pdf-icon.png) | Add to Reading ListSource URL: expo-itsecurity.ruLanguage: English - Date: 2013-03-07 02:16:44
|
---|
62![Press release Boulogne-Billancourt, July 6, 2012 Leading Analyst Firm report on WAF market highlights trends that play to DenyAll’s competitive advantage A Competitive Landscape published on June 29, 2012, highlights s Press release Boulogne-Billancourt, July 6, 2012 Leading Analyst Firm report on WAF market highlights trends that play to DenyAll’s competitive advantage A Competitive Landscape published on June 29, 2012, highlights s](https://www.pdfsearch.io/img/544fb2884189db6e43ec219cb0d8dfbf.jpg) | Add to Reading ListSource URL: www.denyall.comLanguage: English - Date: 2015-02-25 04:56:16
|
---|
63![AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor](https://www.pdfsearch.io/img/0709c50f44e49449c1b4a2e4a8d40be8.jpg) | Add to Reading ListSource URL: www.akamai.deLanguage: English - Date: 2014-07-29 16:36:01
|
---|
64![Protocol-Level Evasion of Web Application Firewalls Protocol-Level Evasion of Web Application Firewalls](https://www.pdfsearch.io/img/651a887e6fddd5b14401b86a3f548d0b.jpg) | Add to Reading ListSource URL: community.qualys.comLanguage: English - Date: 2015-02-09 23:07:14
|
---|
65![Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis](https://www.pdfsearch.io/img/ee42d3f6b2e71011ab9bc75a06fbcf4a.jpg) | Add to Reading ListSource URL: www.checkmarx.comLanguage: English - Date: 2014-12-31 05:13:21
|
---|
66![AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor](https://www.pdfsearch.io/img/43205fd093d3281f552626f60c371664.jpg) | Add to Reading ListSource URL: www.akamai.frLanguage: English - Date: 2014-07-29 16:36:01
|
---|
67![SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK](https://www.pdfsearch.io/img/4b307c7f11f562440c68f66d53ae8def.jpg) | Add to Reading ListSource URL: dave.recoil.orgLanguage: English - Date: 2014-05-31 17:38:32
|
---|
68![White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications
Table of Contents White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications
Table of Contents](https://www.pdfsearch.io/img/7879231d6d310e2b8f19044fc8d80073.jpg) | Add to Reading ListSource URL: www.akamai.co.krLanguage: English - Date: 2012-01-25 15:24:03
|
---|
69![White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications
Table of Contents White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications
Table of Contents](https://www.pdfsearch.io/img/4e09ba93adcdf75abcee83dbfcd6e1cf.jpg) | Add to Reading ListSource URL: www.akamai.deLanguage: English - Date: 2012-01-25 15:24:03
|
---|
70![cloud ips/firewall The best of Dedicated and Cloud Computing together Global Protection and Prevention at the Edge of the Internet The Total Uptime Cloud IPS/Firewall protects Web applications at the very edge of the Int cloud ips/firewall The best of Dedicated and Cloud Computing together Global Protection and Prevention at the Edge of the Internet The Total Uptime Cloud IPS/Firewall protects Web applications at the very edge of the Int](https://www.pdfsearch.io/img/320e2a719d8324d11395a6a1e954054b.jpg) | Add to Reading ListSource URL: totaluptime.comLanguage: English - Date: 2015-02-27 13:49:50
|
---|