SQL Injection Multimedia

(View All Report Types)
Best practices: Deliver next-gen automotive infotainment systems
sponsored by IBM
WEBCAST: In the realm of next-generation automotive infotainment systems, innovation continues to grow exponentially, with new system features creating both trends and challenges. In this informative webcast, discover a fundamental approach for success in E/E engineering and learn how the ever-increasing complexities can be simplified.
Posted: 26 Mar 2014 | Premiered: Mar 26, 2014

IBM

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Developer Training on SharePoint 2010
sponsored by Microsoft Corporation India Pvt Ltd
VIDEO: This training course was designed for professional developers interested in using Microsoft SharePoint 2010 to rapidly develop and deploy solutions. The course contains a series of videos and presentations that will help guide you along the way.
Posted: 10 Dec 2009 | Premiered: 10 Dec 2009

Microsoft Corporation India Pvt Ltd

Deliver Virtual Apps and Desktops as Mobile Services
sponsored by Citrix
VIDEO: This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
Posted: 24 Oct 2013 | Premiered: 24 Oct 2013

Citrix

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Using Mac and Windows apps side-by-side
sponsored by Parallels, Inc.
WEBCAST: Listen to this podcast to learn how you can run Mac and Windows applications side-by-side
Posted: 14 Aug 2012 | Premiered: Aug 14, 2012

Parallels, Inc.

Supercharge delivery of IBM WebSphere Solutions
sponsored by IBM
WEBCAST: View this webcast to discover tools that can help software development organizations to accelerate design and development, reduce the cost of quality, optimize security and compliance, and reduce deployment and operations costs.
Posted: 29 May 2012 | Premiered: May 25, 2012

IBM