TechTutorials - Free Computer Tutorials  







Application Security Tutorials






Tutorials (7)

Total Tutorials: 6548  |  Added today: 0 Tutorials updated: 01/16/2018



Sort Tutorials By:


Application Security Redux: Itís All about the Apps (Part 1)
 
In this article series, we'll begin with a broad overview of application security, how it's evolved, and why it's so important. Then we'll get more specific and talk about the components of an application security plan and different ways to accomplish the goals that you set.
Added: 06/10/2016, Hits: 211, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Application Security Redux: Itís All about the Apps (Part 2)
 
In this Part 2, weíre going to start with a look at how to protect applications from tampering or access and also take a closer look at the special case of mobile applications.
Added: 06/10/2016, Hits: 141, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Application Security Redux: Itís All about the Apps (Part 3)
 
In this Part 3 weíll discuss how you can block undesirable applications and restrict what users are able to do with the apps that you do allow them to use.
Added: 06/10/2016, Hits: 133, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Application Security Redux: Itís All about the Apps (Part 4)
 
In this Part 4, we'll be delving into Microsoftís AppLocker, which was introduced in Windows 7 and Server 2008 R2 and grew out of the previous Software Restrictions Policies feature.
Added: 06/10/2016, Hits: 106, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Application security redux: Itís All about the Apps (Part 5) Hot
 
In this article, we'll provide a summary of the PowerShell cmdlets that Microsoft has made available for AppLocker.
Added: 07/04/2016, Hits: 3,047, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The return of macro attacks Hot
 
Macro attacks are on the rise. Microsoft suggests that 98% of Office-targeted threats are utilising macros presently. Letís revisit macros, this old-fashioned form of attack - consider ways to deter the threat and look at the new Microsoft Office 2016 feature released to help defend organisations against the resurge in macro attacks.
Added: 06/27/2016, Hits: 2,803, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Risk of Running Obsolete Software (Part 4)
 
In this Part 4, weíre going to look at some use case scenarios and the important real life consequences that can come with continuing to use specific outdated technologies in the work place.
Added: 06/10/2016, Hits: 141, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Items Per Page:







7 Seconds Resources, Inc.




IT Showcase