Code Function Of NetworksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Function Of Networks returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Database Administration
 •   Vulnerability Assessment
 •   Databases
 •   Application Management and Maintenance
 •   Network Management
 •   Automated Software Quality (ASQ)

Related Searches
 •   Capacity Code Function
 •   Code Compare
 •   Code Function Of Expert
 •   Code Function Of Fact
 •   Code Function Of Performance
 •   Definition Of Code Function
 •   Device Code
 •   Finds Code Function Of
 •   Package Code Function
 •   Service Code
Advertisement

ALL RESULTS
1 - 25 of 415 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 15, 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Unraveling Web Malware by FireEye

September 29, 2008 - (Free Research)
There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft. 
(WHITE PAPER) READ ABSTRACT |

Cut Coding for Faster Service Desk Deployments by Nimsoft, Inc.

January 04, 2012 - (Free Research)
Learn an alternative to legacy service management solutions that is fast to deploy, easy to configure, and can help your organization realize faster time to value and lower total cost of ownership, both immediately and in the long term. 
(WHITE PAPER) READ ABSTRACT |

Giving Your Oracle Hardware Performance a Shot in the Arm by EMC Corporation

March 15, 2013 - (Free Research)
In this expert handbook, discover three ways to boost Oracle database and application performance that normal Oracle development thinking might cause you to overlook: selecting metrics for server hardware, improving project management, and harnessing in-memory processing. 
(EBOOK) READ ABSTRACT |

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility by Motorola RFID Solutions

November 30, 2007 - (Free Research)
Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort. 
(WHITE PAPER) READ ABSTRACT |

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services by F5 Networks

December 2004 - (Free Research)
Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

How to write a RFP for Master Data Management: 10 Common Mistakes to Avoid by Siperian, Inc.

September 2007 - (Free Research)
Critical master data management (MDM) functionality can be easily overlooked when request for proposals (RFPs) are narrowly focused on a single business data type. Ensure success by avoiding 10 costly mistakes when writing your RFP. 
(WHITE PAPER) READ ABSTRACT |

Decision Services: The Next SOA Challenge by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses the issues associated with decision services in an SOA strategy, highlighting how business rule management systems can be used to overcome these challenges. 
(WHITE PAPER) READ ABSTRACT |

What's New in Toad for Oracle v11.6 by Dell Software

January 2013 - (Free Research)
Watch this video to find out why Toad for Oracle is the best solution for database professionals. Find out more about how it combines the functionality available with specialized editions built for a job function. It also offers accured code development and a simpler approach to administration. 
(WEBCAST) READ ABSTRACT |

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications by Hewlett-Packard Limited

December 2012 - (Free Research)
Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world. 
(PRESENTATION) READ ABSTRACT |

Ovum: Corporate eGRC update by RSA, The Security Division of EMC

December 2010 - (Free Research)
This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future. 
(WHITE PAPER) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Case Study: Modernize Your Requirements Management Practice by HP Software

July 2011 - (Free Research)
View this webcast to how Novartis, a global health care company, improved requirements management in their SAP environment to provide more complete traceability, ensuring that they developed against their requirements and successfully tested them. 
(WEBCAST) READ ABSTRACT |

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

How to tackle Enterprise Information Protection & Control by ComputerWeekly.com

November 2010 - (Free Research)
Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM). 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server by EnterpriseDB Corporation

March 2008 - (Free Research)
This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code. 
(TRAINING GUIDE) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 415 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts