Guides Script MediumWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guides Script Medium returned the following results.
RSS What is RSS?
Related Categories

 •   Scripting
 •   Application Security
 •   Application Management and Maintenance
 •   Testing and Analysis
 •   Vulnerability Assessment
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Business Process Management (BPM)
 •   Enterprise Systems Management
 •   Business Process Automation

Related Searches
 •   Benefits Of Guides Script Medium
 •   E-Commerce Guides Script
 •   Examples Guides Script Medium
 •   Guides General
 •   Guides Script Medium Advertising
 •   Guides Script Medium Productivity
 •   Guides Script Papers
 •   Improvements Guides Script Medium
 •   Resources Guides Script Medium
 •   Statement Guides Script
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

HP LoadRunner Software Tips and Tricks for Configuration Scripting and Execution by Hewlett-Packard Company

August 2008 - (Free Research)
This guide is intended to help new users and seasoned professionals learn new ways to design and implement successful load testing initiatives using HP LoadRunner. 
(ARTICLE) READ ABSTRACT |

Expert Insight into Powershell's Scripting by Dell Compellent

September 2011 - (Free Research)
To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management. 
(EGUIDE) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by Veracode, Inc.

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by Network Automation, Inc

October 2010 - (Free Research)
This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms: Ubuntu Enterprise Cloud by Intel

May 2010 - (Free Research)
This paper provides a detailed summary of the reference architecture for Canonical Ubuntu Enterprise Cloud using Intel-based servers, demonstrating a complete implementation that includes scripts and screen shots. Read this paper for a starting point on how to build and operate a cloud infrastructure. 
(CASE STUDY) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Automating Group Policy Management by SDM Software

March 2008 - (Free Research)
Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated. 
(WHITE PAPER) READ ABSTRACT |

Creating Your Own Virtual Machine Backup Strategy by Veeam Software

March 2011 - (Free Research)
This e-guide from SearchDataBackup.com is intended to help you devise the best VM backup strategy for your business. Discover the pros and cons of different methods including traditional backups, backup scripts, VMware consolidated backup, third-party VI3-specific backup products and more. 
(EGUIDE) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

Guide: Desktop Authority by ScriptLogic Corporation

August 2009 - (Free Research)
Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builder Guide: Cloud Design and Deployment on Intel® Platforms: Red Hat* Cloud Foundations by Intel

November 2010 - (Free Research)
This paper is for cloud service providers, hosts, and enterprise IT organizations who are looking to build their own cloud infrastructure, the decision to use a cloud for the delivery of IT services is best done by starting with the knowledge and experience gained from previous work. Read on to learn more about cloud design and deployment. 
(WHITE PAPER) READ ABSTRACT |

Under Armour Improves Performance of SAP Data Loading with Winshuttle by Winshuttle, LLC

December 2008 - (Free Research)
Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention. 
(CASE STUDY) READ ABSTRACT |

Maximizing IT Investments: Recession-proofing Your Network by F5 Networks

July 2008 - (Free Research)
This whitepaper outlines a plan that enables network teams to implement a plan that optimizes application performance. It also identifies recession-proof networking technologies and their challenges. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Mobile Application Development: Making it Easier for Developers by IBM

February 2011 - (Free Research)
Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. This e-book will explain what all the fuss is about. 
(EBOOK) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

December 2010 - (Free Research)
This presentation transcript brought to you by Network Automation, Inc. outlines a conversation between Aleksey Lazaryev and Martin Gadzinowski which discusses scripting issues in the business world and what types of solutions can be implemented to solve these issues. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits by BlueCoat

July 2011 - (Free Research)
Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering. 
(EGUIDE) READ ABSTRACT |

SiSense Prism Do-It-Yourself Business Intelligence Software by SiSense Ltd.

September 2010 - (Free Research)
Cutting-edge, do-it-yourself business intelligence (BI) and analytics. Go from mountains of raw data to reports, dashboards and analytics in a single product, in just an hour or two! Data preparation and mash ups are quick and easy, using visual drag-and-drop tools. 
(DOWNLOAD)

How to better manage batch jobs in Oracle environments by UC4 Software, Inc

November 2011 - (Free Research)
In part one of this two-part e-guide series, readers will learn about the basics of batch technology and how it relates to business processes. In addition, learn how batch processing and business process automation are handled in Oracle-specific environments. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts