Online Learning

Monday, 19th May 2025
  • Twitter
  • Facebook
  • Google+
  • RSS
  • Home
  • Career Development
    • Career Guide
    • Career Change
    • Career Series
    • Resume Series
    • Job Search
    • Certification
    • Communication Skills
    • Soft Skills
    • Employment
    • Part Time Jobs
    • WorkPlace
  • Interview Series
    • Cover Letter Tips
    • Freshers Tips
    • Interview Series
    • Campus Interview
    • Phone Interview
    • Face to Face Interview
  • Industry
    • Advertising Career
    • Aerospace Careers
    • Automotive Careers
    • Biotechnology Careers
    • Consumer Products Career
    • Hospitality Careers
    • IT Careers
  • Testing
    • Software Testing
    • Winrunner
  • Information Technology
    • Data Warehouse
      • Business Intelligence
      • Data Acquisition
      • Data Analysis
      • Data Architecture
      • Data Distribution
      • Data Extraction
      • Data Governance
      • Data Index
      • Data Integrity
      • Data Management
      • Data Marts
      • Data Migration
      • Data Profiling
      • Data Quality
      • Data Replication
      • Data Storage
      • Data Structure
      • Data Types
      • Data Warehouse Basics
    • Database Concepts
      • Oracle
      • Learn SQL
      • Database
    • Concepts
    • Data Modeling
    • ITIL
    • Security
    • SaaS
    • SDLC
    • VoiceXML
    • Wireless
  • Programming
    • Ruby on Rails
    • C
  • Questions?

Category Archives: Security

Web Application Security: Don’t Bolt It On; Build It In

June 21, 2008 no comments
How secure are your Web applications? Unless you conduct application vulnerability testing throughout the lifespan of your applications, there's no way for you to know about your web application secu...

Effective Controls for Attaining Continuous Application Security

July 24, 2007 no comments
Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle

Given the choice, every organization would want secure Web...

Implementing Effective Vulnerability Remediation Strategies

July 12, 2007 no comments
Once you've completed a security assessment as a part of your web application development, it's time to go down the path of remediating all of the security problems you uncovered. At this point, your...

Web Application Vulnerability Assessment Essentials

June 24, 2007 no comments
If an organization isn't taking a systematic and proactive approach to web security, and to running a web application vulnerability assessment in particular, then that organization isn't defended aga...

Top 10 Application Security Vulnerabilities in Web.config Files &#8211...

June 8, 2007 no comments
These days, the biggest threat to an organization's network security comes from its public Web site and the Web-based applications found there. Unlike internal-only network services such as databases...

Top 10 Application Security Vulnerabilities in Web.config Files &#8211...

June 7, 2007 no comments
Some of the most common and dangerous application security vulnerabilities that exist in ASP.NET Web-based applications come not from the C# or VB.NET code that make up its pages and service methods,

Preventing a Brute Force or Dictionary Attack: How to Keep the Brutes ...

January 13, 2007 no comments
To understand and then combat a brute force attack, also known as a dictionary attack, we must start by understanding why it might be an appealing tool for a hacker. To a hacker, anything that must b...

Malicious Code Injection: It’s Not Just for SQL Anymore

October 21, 2006 no comments
Malicious Code Injection: It’s Not Just for SQL Anymore More and more, developers are becoming aware of the threats posed by malicious code, and SQL injection in particular, and by leaving code...

Featured Posts

  • What Are Your Career Expectations?

  • Career Action Plan

Categories

What’s New

  • Microsoft Free Books Full Versions
  • What Are Your Career Expectations?
  • Career Action Plan
  • Tips for Effective Resume
  • Setting Your Career Goal and Objective

Recent Pins

Subscribe to RSS Feeds

Get all latest content delivered to your email a few times a month.

Popular Posts

1

What are the limitations with switch statement?

Jul 4, 2006 1
2

What is the necessity of SDLC?

Jan 13, 2008 1
3

Prefix and Postfix Operator

Jul 2, 2006 1
4

What is 10BASE5 Standard

Mar 10, 2008 1
5

What is Data Partitioning

May 23, 2008 1

Interact

  • Follow us on Twitter
  • Like us on Facebook
  • Join us on Google+
  • Subscribe RSS Feeds
  • Contact us

Pages

  • Terms and Conditions
  • Privacy Policy
  • DMCA
  • About Us
Geekinterview.com
Tampa
Florida 33647

© 2025 Online Learning by GeekInterview.com