Code Form WindowsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Form Windows returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Network Security
 •   Virtualization
 •   Desktop Management
 •   Automated Security Auditing/ Source Code Analysis
 •   Data Security
 •   Application Management and Maintenance
 •   Application Security
 •   Security Policies
 •   Embedded Application Development

Related Searches
 •   Benefits Of Code Form Windows
 •   Code Form Calendar
 •   Code Form Cycles
 •   Code Form Systems
 •   Code Form Windows Businesses
 •   Code Form Windows Consultant
 •   Code Form Windows Template
 •   Code Form Windows Webcasts
 •   Spreadsheet Code Form
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

ManageEngine OpManager 8.5 by ManageEngine

July 27, 2010 - (Free Research)
OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc. 
(TRIAL SOFTWARE) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 03, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Resources for iOS developers (Windows Store apps) by Microsoft

March 05, 2013 - (Free Research)
If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps. 
(RESOURCE CENTER) READ ABSTRACT |

Resources for Android developers (Windows Store apps) by Microsoft

March 05, 2013 - (Free Research)
If you're an Android developer looking to get started creating apps for Windows 8, look no further than this resource center made just for you. You'll get tools on how to build Windows Store apps using a variety of programming languages, including blog posts, coding road maps, and much more. 
(RESOURCE CENTER) READ ABSTRACT |

Getting Started: Learn to build Windows Store apps by Microsoft

April 15, 2013 - (Free Research)
In this guide, discover all the fundamentals you need to get your first Windows app off the ground. Read on to explore everything from planning, selling, and packaging apps, to coding in XAML to HTML5 to C++, to concepts and architectures. 
(RESOURCE CENTER) READ ABSTRACT |

Windows 8 Secrets by ComputerWeekly.com

June 28, 2013 - (Free Research)
Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book. 
(BOOK) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Windows Server 2012 Migration Station by SearchWindowsServer.com

January 22, 2014 - (Free Research)
This handbook from searchWindowsServer.com discusses what’s new with Windows Server 2012, what it’s capable of, how it affects Linux machines, its relationship to tablet computing and more. 
(EGUIDE) READ ABSTRACT |

Windows Server 2012 Migration Station by SearchWindowsServer.com

July 17, 2013 - (Free Research)
Windows Server 2012 offers a slew of new features, including many aimed at the cloud. 
(EBOOK) READ ABSTRACT |

IT@Intel White Paper: Remediating Applications when Migrating from Microsoft Windows XP to Microsoft Windows 7 by Intel

May 10, 2010 - (Free Research)
Read this paper to learn why Intel is migrating from Microsoft Windows XP to Microsoft Windows 7, and how the new system is expected to boost long-term performance, security, manageability, and productivity needs. 
(WHITE PAPER)

Increase Productivity and Effectiveness of Merchandising Audits with the MC35 by Motorola, Inc.

March 01, 2007 - (Free Research)
The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store. 
(WHITE PAPER) READ ABSTRACT |

Deciphering the Different Forms of Data Deduplication by Veeam Software

April 17, 2014 - (Free Research)
This paper examines a handful of forms of data deduplication, from inline to chunk-based,  and focuses on the certain technology embedded in Windows Server 2012 R2, plus the benefits it can bring to your environment. 
(WHITE PAPER) READ ABSTRACT |

Installing Windows 2008 Hyper-V Best Practices for Xiotech Emprise 7000 by Xiotech Corporation

June 03, 2010 - (Free Research)
This document provides step-by-step instructions on installing Hyper-V and a host operating system. Windows 2008 must be installed and configured prior to installing Hyper-V. In addition, all other server configuration tasks, such as network configuration, domain membership, must be complete before installing Hyper-V. 
(WHITE PAPER) READ ABSTRACT |

Maximizing the Benefits of Virtualization: Windows Server® 2008 Hyper-V™ and the Intel® Xeon® Processor 5500 Series by Dell and Microsoft

March 01, 2009 - (Free Research)
Together, Windows Server 2008 Hyper-V and servers based on the Intel Xeon processor 5500 series provide a highly efficient foundation for virtualization with improved performance and energy efficiency, increased flexibility, higher reliability and lower TCO. Read this paper to learn about the features and business benefits of these solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Development Center by Microsoft

April 24, 2013 - (Free Research)
Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android. 
(RESOURCE CENTER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts