Computer Networking Kurose SolutionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computer Networking Kurose Solutions returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Network Management
 •   Intrusion Prevention Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Networks
 •   Fraud Detection & Prevention
 •   Unified Communications / Voice & Data Convergence
 •   Business Intelligence Solutions
 •   Storage Management
 •   Identity Management/ User Provisioning

Related Searches
 •   Computer Networking Basics
 •   Computer Networking History
 •   Computer Networking Kurose Commercial
 •   Computer Networking Kurose Documents
 •   Computer Networking Mississippi
 •   Customer Computer Networking Kurose
 •   Media Computer
 •   Packages Computer Networking Kurose
 •   Systems Computer
 •   Technologies Computer Networking
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

The OSI Model: Understanding the Seven Layers of Computer Networks by Global Knowledge

July 2006 - (Free Research)
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

HP Advanced Data Center Network Architectures Reference Guide by HP & Intel®

May 2011 - (Free Research)
Read this white paper and trace the steps to a successful converged network infrastructure. By identifying today's most important IT trend - virtualization - you'll be on your way to implementing HP supported technologies to enhance your virtualized computer networks. 
(WHITE PAPER) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

Flexible and Reliable Healthcare Networks - Enabling better patient care, reducing risk, and increasing regulatory compliance by Ciena

August 2010 - (Free Research)
Changes in the healthcare industry and the adoption of new applications and bandwidth-intensive technologies are pushing legacy medical networks to the limit. Access this paper to learn about the next generation of healthcare networking platforms. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

TechTarget ANZ’s guide to upgrading your PBX by VExpress

October 2010 - (Free Research)
Read this guide and discover how a new PBX could trim your telephony costs and boost productivity. 
(EBOOK)

NAC: Managing Unauthorized Computers by Sophos, Inc.

February 2008 - (Free Research)
Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Planning a Career Path in Cybersecurity by Global Knowledge

November 2013 - (Free Research)
The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing. 
(WHITE PAPER) READ ABSTRACT |

Connected Businesses Win by Cisco Systems, Inc.

August 2009 - (Free Research)
For small and medium-sized businesses (SMBs), networks can do more than simply connect machines. They also deliver voice (telephone) and video, and connect functions such as sales and bookkeeping to make business more efficient, collaborative, and profitable. Read this paper learn about core network components and benefits. 
(WHITE PAPER) READ ABSTRACT |

Delivering IT as a Service for Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Architecting a successful cloud computing infrastructure can be challenging. The secure cloud architecture offers the best products and features to create a cloud service that can realize the efficiencies of shared infrastructure while still offering the security, flexibility, resilience, and ease of management of a traditional IT deployment. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services by AT&T Corp

December 2009 - (Free Research)
This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly – 27 May 2014: Targeting the digital customer by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we go behind the scenes of John Lewis's £40m e-commerce transformation plan to find out how to target the digital customer. Starbucks' European CIO talks about the coffee chain's IT strategy. And we evaluate three big suppliers' plans for virtualised networking. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype? by SearchSecurity.com

March 2013 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 19 November 2013: Software-defined networking explodes by SearchSecurity.com

November 2013 - (Free Research)
In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 3 June 2014: How big data brings big donations for charities by ComputerWeekly.com

June 2014 - (Free Research)
In this week's Computer Weekly, hear how big data is helping charities to improve their fundraising by better targeting potential donors. We find out how the UK's biggest newspaper publisher is moving its IT to the cloud. And we examine the options for datacentre cooling technologies to cut your energy costs. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 6 May 2014: The problems of legacy IT in banking by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, as problems caused by legacy IT in banks become increasingly critical, we assess the difficulties in updating banking systems. After the Windows XP support issues – we look at a similar problem facing Oracle users. And we take an in-depth look at managing corporate networks to enable mobile IT. Read the issue now. 
(EZINE) READ ABSTRACT |

vokeStream Market Snapshot: Automated Testing of Networks and Connected Devices by Fanfare

November 2007 - (Free Research)
Service providers and network equipment manufacturers are adding automation to their pre-production testing process for a combination of reasons. This Market Snapshot will focus on the need for test automation of networks and connected devices, identify a path to automation adoption and provide an overview of the market. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly – 20 May 2014: The future of networks by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we look how IT and networking departments are addressing demand for apps, bandwidth and services. Virtualisation technology is being used to consolidate multiple network equipment types onto industry-standard high-volume servers, switches and storage. 
(EZINE) READ ABSTRACT |

Computer Weekly Network IT case studies by ComputerWeekly.com

July 2013 - (Free Research)
Jennifer Scott takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 29 January 2013: The end of the PC refresh cycle? by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts