Documents
Access relevant articles and papers
on Application Security and related topics
Injection Attacks – The Complete Guide
PDF Document
Get this guide to understand and address the most common form of cyberattack: injection, including SQL, LDAP, XML, XPath, XML external entity (XXE), Expression Language (EL), and OS command injection attacks.
Avoiding Cross Site Request Forgery – A comprehensive guide
PDF Document
Learn about CSRF cyber threats and how to reduce your exposure to them for major programming languages including Java, Javascript, JSP, C#, PHP & Python.
IDC Report – Digital Security Challenges from design to deployment
PDF Document
This report from global market intelligence firm IDC explores the impact of digital transformation on companies striving to accomplish security from design to deployment, using approaches such as the Secure SDLC and DevSecOps.
REST Secure
PDF Document
Read this in-depth guide to address REST (REpresentational State Transfer, an architectural style that defines a set of constraints and properties based on HTTP) security issues.
DOWNLOADOWASP Top 10 – 2017
PDF Document
Learn about the top 10 web application vulnerabilities (using the current list published by OWASP in 2017), including strategies to identify and remediate vulnerabilities.
4 Steps for Improving my DevSecOps Process + 3 KPIs to Monitor my Results
PDF Document
Elevate the essential role of InfoSec within the development lifecycle and foster collaboration between your development, security and operations teams. Learn how in this practical guide.
Why Businesses Need Application Security
PDF Document
This ebook outlines the latest trends in application security, with up-to-date figures in terms of known attacks and the steps required to solve them.The guide is a must-read for those interested in learning how to secure their application portfolios. Updated to include 2019 security research.
Bulletproofing your SAP ABAP applications
PDF Document
Get an informative guide to bulletproofing your ABAP developments. Have you heard of SQL injection or backdoors? Do you know how to face these and many other security threats? Learn about vulnerabilities distribution and attack surface, and discover how to address them.