Government It Security ManualsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government It Security Manuals returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Application Security
 •   Testing and Analysis
 •   Network Security
 •   Vulnerability Assessment
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Configuration Government It
 •   Definitions Government It Security
 •   Directories Government It Security
 •   Government It Industries
 •   Government It Repair
 •   Government It Security Developments
 •   Group Government It
 •   Imports Government It Security
 •   Manufacturer Government It
 •   Study Government
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 12, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Increasing the efficiency of case file coordination in social services by IBM

June 2011 - (Free Research)
Social service agencies are experiencing challenges with manual processes. Advanced case management strategies are being implemented to streamline these processes and foster greater insight, collaboration and decision-making capabilities. This white paper explains how one such solution allows you automate these processes to elevate processing. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat Accelerates Automated CLI Testing, Reaps New Efficiencies with FanfareSVT by Fanfare

December 2006 - (Free Research)
Blue Coat needed to improve its test automation practices with tools & solutions that automate test cases during the development phase, increase test coverage, & identify changes that are not easily identified from build to build. Read why Blue Coat selected FanfareSVT test automation software to work seamlessly within its existing infrastructure. 
(CASE STUDY) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Windows Workstations - Seven Most Important Events by Prism Microsystems Inc.

September 2008 - (Free Research)
Monitoring event logs from workstations provides two important benefits a) Save money by adopting a proactive approach to supporting end users (enhanced productivity), and b) Enhance overall security of your organization. 
(WHITE PAPER) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Jumpstart Your Windows Vista Migration With Enteo Client Lifecycle Management From FrontRange Solutions by Centennial-Software

July 2008 - (Free Research)
This whitepaper serves as a guideline for Vista migration projects, highlights the key challenges and cautions and outlines an ideal approach to successfully migrate to Windows Vista. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Public Folders to SharePoint Migration by Dell Software

March 2008 - (Free Research)
Public Folder Migrator enables you to perform migration of public folders' structure and contents into SharePoint Services and Portal Server sites. 
(WHITE PAPER) READ ABSTRACT |

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker by i365, makers of Evault

July 2008 - (Free Research)
In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice. 
(WHITE PAPER) READ ABSTRACT |

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

Integrated System Management and Support by Oracle Corporation

March 2011 - (Free Research)
In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and Automation Drive Dynamic Data Centers by CA Technologies.

October 2008 - (Free Research)
Learn how virtualization and automation in the data center will lead to better customerexperience, reduced environmental impact and increased capacity for future services. 
(WHITE PAPER) READ ABSTRACT |

Uniting Your Automated and Manual Test Efforts by SmartBear Software

September 2010 - (Free Research)
Software development teams are always looking for an edge to produce features more quickly while retaining a high level of software quality. This document describes best practices for uniting both automated and manual test efforts to improve your software releases and obtain the highest quality releases in the shortest amount of time. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts