About ScriptWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Script returned the following results.
RSS What is RSS?
Related Categories

 •   Scripting
 •   Application Security
 •   Business Process Management (BPM)
 •   Business Process Automation
 •   Testing and Analysis
 •   Application Management and Maintenance
 •   Enterprise Systems Management
 •   Vulnerability Assessment
 •   Rapid Application Development (RAD)
 •   Data Center Management

Related Searches
 •   About Business
 •   About Script Hardware
 •   About Script Measurement
 •   About Script Suite
 •   About Server
 •   Customer About Script
 •   Forms About Script
 •   Issues About Script
 •   Practice About Script
 •   Sales About
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by Network Automation, Inc

October 27, 2010 - (Free Research)
This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 28, 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 23, 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 01, 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 30, 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

Competitive Analysis of Market Leaders in Data Modeling: PowerDesigner, ERwin and ER/Studio by Sybase, an SAP company

June 09, 2009 - (Free Research)
Read this paper to learn all the factors you need to consider when choosing a data modeling tool. You will learn about the different model types and how each tool measures up to the demanding needs of your company today and in the future. This paper will lay out all the information you need to make a clear decision on data modeling today. 
(WHITE PAPER)

Exchange Insider E-Zine vol. 13 – Everything you need to know about Exchange Online retention policies by SearchExchange.com

April 20, 2012 - (Free Research)
In this expert e-zine, explore the numerous benefits of Exchange Online retention policies as well as the PowerShell script necessary to manage and implement them. In addition, discover techniques to repair Outlook Web App 2010, new tools from the Microsoft Exchange team, and the latest Exchange updates. 
(EZINE)

Expert Insight into Powershell's Scripting by Dell Compellent

September 22, 2011 - (Free Research)
To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management. 
(EGUIDE) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 23, 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

HP LoadRunner Software Tips and Tricks for Configuration Scripting and Execution by Hewlett-Packard Company

August 2008 - (Free Research)
This guide is intended to help new users and seasoned professionals learn new ways to design and implement successful load testing initiatives using HP LoadRunner. 
(ARTICLE) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

December 2010 - (Free Research)
This presentation transcript brought to you by Network Automation, Inc. outlines a conversation between Aleksey Lazaryev and Martin Gadzinowski which discusses scripting issues in the business world and what types of solutions can be implemented to solve these issues. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by Veracode, Inc.

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

E-Book: Mobile Application Development: Making it Easier for Developers by IBM

February 2011 - (Free Research)
Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. This e-book will explain what all the fuss is about. 
(EBOOK) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 8 by SearchBusinessAnalytics

August 2012 - (Free Research)
Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes. 
(EGUIDE) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Faster PHP Through Java by Caucho Technology

March 2009 - (Free Research)
Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive. 
(WHITE PAPER) READ ABSTRACT |

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension

February 2014 - (Free Research)
In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS. 
(VIDEO) READ ABSTRACT |

Modern Malware Threats and Countermeasures by Sunbelt Software

November 2008 - (Free Research)
Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

Windows PowerShell 2.0 by Microsoft

January 2009 - (Free Research)
Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended. 
(WEBCAST)

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

The Agility Gap in Today's Private Clouds by Red Hat

August 2013 - (Free Research)
Check out this white paper to explore the current challenges businesses are facing in terms of agility that private clouds have and learn how to overcome these challenges to achieve true business agility. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts