Department Of Defense MaintenanceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Department Of Defense Maintenance returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Endpoint Security
 •   Application Management and Maintenance
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Resource Planning (ERP)
 •   Network Security
 •   Storage Security
 •   Technology Outsourcing

Related Searches
 •   Access Department
 •   Contacts Department
 •   Department Network
 •   Department Of Capacities
 •   Department Of Defense Guideline
 •   Department Of Defense White Paper
 •   Department Of Supplier
 •   Proposals Department Of
 •   Requirements Department Of
 •   Tutorial Department Of Defense
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Department of Defense and Open Source Software by Oracle Corporation

January 01, 2008 - (Free Research)
This white paper looks at the pros and cons of open-source software and helps organizations understand how to build a business case that is based on cost, schedule, performance and risks across the entire program lifecycle not just up-front program inception costs and considerations.  
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

The US Department of Defense Maintains Application Security and Eliminates Software Conflicts When Deploying Applications to Locked-down Desktops by Thinstall

January 2008 - (Free Research)
The DOD chose Thinstall to address the demanding deployment requirements, using it initially for 12 applications. 
(CASE STUDY) READ ABSTRACT |

CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US Department of Defense Architecture Framework by ComputerWeekly.com

October 2010 - (Free Research)
Numerous architecture framework standards have been developed and matured over the past decade and the focus of these frameworks is diverse. Many engineers believe there is an ―either or‖ decision to be made regarding these frameworks; however, this is not always the case. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Bringing Reliability to Distributed Data (e2M) by Dell, Inc.

May 2011 - (Free Research)
Check out this short case study to see how this environmental engineering firm was able to design a centralized backup architecture - improving their data recovery success rate from 60% to 100% - with help from Dell and Symantec. 
(CASE STUDY) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

The Department of Defence and Open Source Software by Oracle Corporation UK Ltd

March 2009 - (Free Research)
Is open source software a viable strategy for large-scale SOA deployments, especially at the U.S. Department of Defence? 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 11 March 2014: Making data flow freely by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. 
(EZINE) READ ABSTRACT |

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches by Boldon James

July 2011 - (Free Research)
In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates. 
(WHITE PAPER) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Strategies for Profitable Growth - Aerospace & Defense Manufacturing by SAP AG

January 2005 - (Free Research)
Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business. 
(WHITE PAPER) READ ABSTRACT |

Advanced Threat Protection with Dell SecureWorks Security Services by Dell SecureWorks UK

December 2013 - (Free Research)
This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them. 
(WHITE PAPER) READ ABSTRACT |

Hidden Lynx – Professional Hackers for Hire by Symantec Corporation

February 2014 - (Free Research)
This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system. 
(WEBCAST) READ ABSTRACT |

Magic Quadrant for Endpoint Protection Platforms by Symantec Corporation

January 2014 - (Free Research)
This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Study Pinpoints Areas of Growth for After-Market Maintenance/Repair/Overhaul Intiaitives by SAP AG

January 2009 - (Free Research)
This study talks about top three trends such as outsourcing MRO, aging aircraft and lean impacting the MRO segment. 
(WHITE PAPER) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

Analyst's take: Siemens product lifecycle management software solutions for aerospace industry by ComputerWeekly.com

January 2011 - (Free Research)
Siemens supports solutions for service and sustainment in the aerospace and defense industries that enable companies to reduce service costs and time cycles while increasing profitability across the service life of products. 
(WHITE PAPER) READ ABSTRACT |

Cyber defense: Understanding and combating the threat by IBM

July 2012 - (Free Research)
The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security by Faronics

January 2010 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts