E-Commerce Full SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: E-Commerce Full Security returned the following results.
RSS What is RSS?
Related Categories

 •   Integrated E-Commerce Solutions
 •   Data Security
 •   Business to Consumer Web Commerce
 •   Business to Business Web Commerce
 •   Virtualization
 •   Customer Relationship Management (CRM)
 •   Network Security
 •   Customer Information Management/ Customer Databases
 •   Data Center Management
 •   Web Content Management and Publishing

Related Searches
 •   Articles About E-Commerce Full Security
 •   Automated E-Commerce Full
 •   Change E-Commerce Full Security
 •   Devices E-Commerce Full
 •   Document E-Commerce Full
 •   E-Commerce Asp
 •   E-Commerce Full Networking
 •   E-Commerce Full Seminars
 •   Making E-Commerce Full
 •   Public E-Commerce Full Security
Advertisement

ALL RESULTS
1 - 25 of 430 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

European cross-border e-commerce by ComputerWeekly.com

January 17, 2012 - (Free Research)
European consumers' growing use digital channels as part of their shopping experience is driving retailers’ focus on delivering efficient online, cross-border operations in Europe, this research report from Accenture reveals. 
(IT BRIEFING) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 01, 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

CW500: Retail IT: The high street vs the internet by ComputerWeekly.com

October 08, 2013 - (Free Research)
Graham Benson, IT Director at M and M Direct, reveals the impact e-commerce and rise of the internet has had on business in this presentation, given to Computer Weekly's 500 Club for IT leaders. 
(PRESENTATION) READ ABSTRACT |

LimelightHD: Transforming the digital media experience with fast delivery of stunning full-screen HD video by Limelight Networks, Inc.

March 06, 2009 - (Free Research)
Read this brief paper to learn how with LimelightHD, a revolutionary new service from Limelight Networks, you'll delight viewers with true HD video that renders in amazing clarity and speed over the Internet. 
(ARTICLE) READ ABSTRACT |

The Essential Guide to Protecting Essential Information by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential. 
(ARTICLE) READ ABSTRACT |

Domino’s Pizza:  Datacentre Transformation by ComputerWeekly.com

May 2012 - (Free Research)
Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business. 
(PRESENTATION) READ ABSTRACT |

Next-Generation Managed Services: The Key to Business Transformation by Alcatel-Lucent

August 2010 - (Free Research)
This paper will address various transformational managed services business model options such as Managed Infrastructure, Managed End to End Services Operations and Full Outsourcing (Virtual Telco), and how they help Communications Service Provider achieve not only cost transformation but also business transformation. 
(WHITE PAPER) READ ABSTRACT |

The Dynamic DNS Infrastructure by F5 Networks

June 2012 - (Free Research)
This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing. 
(WHITE PAPER) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 by KnowledgeStorm Webinars (E-mail this company)

January 2007 - (Free Research)
Find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. Invite your entire team to attend – attendance for this Webcast is free! 
(WEBCAST) READ ABSTRACT |

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment by ComputerWeekly.com

February 2012 - (Free Research)
This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Docmosis V2.0 by Docmosis

June 2009 - (Free Research)
Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool. 
(TRIAL SOFTWARE)

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

A Disruptive Force in the Analytics Industry - LMG Service Sets a New Benchmark for Retail Analytics thanks to Kognitio by Kognitio

July 2008 - (Free Research)
In this case study Loyalty Management Group (LMG), tried to find a way to offer retailers and suppliers the ability to analyze full Electronic Point of Sale (EPOS) data volumes to help them gain insight, intelligence and statistical confidence. 
(CASE STUDY) READ ABSTRACT |

E-commerce and Consumer Retailing: Risks and Benefits by ISACA

December 2010 - (Free Research)
ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

QSA Tokenization Broker Assessors Guide by Intel

May 2011 - (Free Research)
Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments. 
(WHITE PAPER) READ ABSTRACT |

E-Book: How to keep customers -- and keep them happy: High-return tactics for building customer loyalty by Microsoft

October 2011 - (Free Research)
This ebook is full of expert advice for implementing a successful customer experience management (CEM) plan. 
(EBOOK)

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Payment Card Industry Data Security Standard by Prism Microsystems Inc.

June 2008 - (Free Research)
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues. 
(WHITE PAPER) READ ABSTRACT |

Staples Case Study by IBM

September 2011 - (Free Research)
Staples set the bar for the office superstore when it first opened its doors in 1986. It now has the second-largest Internet retail revenue in the world with $10.2 billion in 2010 sales, 43% of the company's total revenue. This paper details how Staples delivered a much more personalized shopping experience to its online customers. 
(CASE STUDY) READ ABSTRACT |

Retail IT - A Computer Weekly Buyer's Guide by ComputerWeekly.com

March 2011 - (Free Research)
Competition has never been so strong and retail organisations are finding they cannot afford to stand still. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 430 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts