Application attacks (buffer overflows, cross-site scripting)

Get the latest news and information on recognizing vulnerabilities and defending against application attacks and threats such as buffer overflows, cross site scripting, SQL injections.

Application attacks (buffer overflows, cross-site scripting) News

View All News

Application attacks (buffer overflows, cross-site scripting) Get Started

Bring yourself up to speed with our introductory content

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both. Continue Reading

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources. Continue Reading

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other network protocol data units like frames or segments). Continue Reading

View All Get Started

Evaluate Application attacks (buffer overflows, cross-site scripting) Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Application attacks (buffer overflows, cross-site scripting)

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Application attacks (buffer overflows, cross-site scripting) Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

Close