Documents

 

Access relevant articles and papers
on Application Security and related topics

 

 

 

 

injection

Injection Attacks – The Complete Guide

PDF Document

Get this guide to understand and address the most common form of cyberattack: injection, including SQL, LDAP, XML, XPath, XML external entity (XXE), Expression Language (EL), and OS command injection attacks.

DOWNLOAD


avoiding csrf

Avoiding Cross Site Request Forgery – A comprehensive guide

PDF Document

Learn about CSRF cyber threats and how to reduce your exposure to them for major programming languages including Java, Javascript, JSP, C#, PHP & Python.

DOWNLOAD


idc report

IDC Report – Digital Security Challenges from design to deployment

PDF Document

This report from global market intelligence firm IDC explores the impact of digital transformation on companies striving to accomplish security from design to deployment, using approaches such as the Secure SDLC and DevSecOps.

DOWNLOAD



rest secure ebook

REST Secure

PDF Document

Read this in-depth guide to address REST (REpresentational State Transfer, an architectural style that defines a set of constraints and properties based on HTTP) security issues.

DOWNLOAD


OWASP top 10 ebook

OWASP Top 10 – 2017

PDF Document

Learn about the top 10 web application vulnerabilities (using the current list published by OWASP in 2017), including strategies to identify and remediate vulnerabilities.

DOWNLOAD


ebook cover

4 Steps for Improving my DevSecOps Process + 3 KPIs to Monitor my Results

PDF Document

Elevate the essential role of InfoSec within the development lifecycle and foster collaboration between your development, security and operations teams. Learn how in this practical guide.

DOWNLOAD


ebook download

Why Businesses Need Application Security

PDF Document

This ebook outlines the latest trends in application security, with up-to-date figures in terms of known attacks and the steps required to solve them.The guide is a must-read for those interested in learning how to secure their application portfolios. Updated to include 2019 security research.

DOWNLOAD


bulletproofing

Bulletproofing your SAP ABAP applications

PDF Document

Get an informative guide to bulletproofing your ABAP developments. Have you heard of SQL injection or backdoors? Do you know how to face these and many other security threats? Learn about vulnerabilities distribution and attack surface, and discover how to address them.

DOWNLOAD