Application security and data protection

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • data recovery agent (DRA)

    A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users. The assignment of DRA rights to an approved individual provides an IT department with a way to unlock encrypte... 

  • proxy hacking

    Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages. An attacker may use proxy hacking to gain an advantage over a competitor or, ultimate... 

About Application security and data protection

This resource guide offers application security and data protection tips and expert advice for security service providers, consultants and value-added resellers (VARs) who need to know how to secure databases, email systems, instant messaging and Web applications. You'll find how-tos and tutorials for application firewalls, and securing instant messaging applications and other productivity applications like Google and Adobe.