Application Security Resume


Advertisement

PC Network EventLog Scanner  v.2.15.56.110

PC Network EventLog Scanner is a program that allows you to scan your network computers for all types of eventlogs added, including eventlog data from 'application', 'security', ' system' and other custom added eventlog criteria available in Microsoft ...

LASsie for MS Access  v.4 6

LASsie (Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access? built-in security, LASsie offers a less complicated way to secure forms, ...





Advertisement

Ascella Log Monitor Plus  v.1. 5. 2001

Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works ...

JOB APPLICATION MASTER  v.2014.4.0

Professional resume creator software for creating optimal and individual documents for a successful job application: Resume, cover letter and cover page. Additional features: Mail application, database for all applications, PDF conversion, many text and ...

Maui Security Scanner

Maui is a automated next-generation web application vulnerability scanner. Able to quickly scan and analyze large complex web sites/applications, Maui identifies application vulnerabilities ( e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion ...

Blink Internet Security with Antivirus  v.3.0

Designed for personal use and home office environments, Blink Personal Internet Security with Antivirus is the only solution to provide consumers with the most protection available when compared to other internet security offerings. Blink Personal is ...

PC Security Suite  v.6.0

Personal Firewall with Spyware and Virus Protection - Total Desktop Security.

Event Log Explorer  v.4.5

Event Log Explorer is a simple but powerful utility for monitoring, viewing and analyzing events in the Security, System, Application and other Microsoft Windows logs. It extends standard Event Viewer functionality and brings a lot of new features. Feel ...

ThreatModeler  v.1.0

ThreatModeler™ will allow companies to build threat models in less than an hour without any knowledge of security. Its Intelligent Threat Engine (ITE), identifies the threat to your application, classifies them based on risk so that the mitigation efforts ...

Event Log Viewer  v.11.01.01

The logs generated are about application events, security events and system events. Detailed information about these event logs can be obtained by the event log viewer, an application provided by Windows. Windows event log viewer contains detailed information ...

CipherLite.NET  v.1 5

NET application settings stored in configuration (.config) files. In addition to encryption, CipherLite.NET™ provides facilities for hashing data and verifying data hashes.

Blink Endpoint Intrusion Prevention  v.2.2

As the industrys first endpoint security solution to incorporate multiple layers of proven technologies, eEye Digital Securitys Blink Endpoint Intrusion Prevention solution addresses today's most pressing security challenge: preventing the attack. No ...

Netsparker Community Edition  v.1.3.7.5

Netsparker can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows ...

CipherSafe.NET  v.1. 5. 2003

It can be used to encrypt and store database connection strings, passwords, encryption keys, and other application secrets in a secure manner.

- Encryption and decryption of application profile values.
- Secure storage and retrieval ...

Oracle IRM Desktop  v.11.1.41.6

Oracle Information Rights Management 11g is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used. Oracle Information Rights Management uses encryption to extend the management ...

Pages : 1 | 2 >
Newest Reviews