Help Security LectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Help Security Lecture returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Collaborative Tools
 •   Wireless Technologies and Mobile Computing
 •   Application Lifecycle Management(ALM)
 •   Disk-based Backup & Storage/ RAID
 •   Unified Communications / Voice & Data Convergence
 •   Application Security
 •   Wi-Fi
 •   Build Management
 •   Security Policies

Related Searches
 •   Events Help Security Lecture
 •   Free Help
 •   Help Download
 •   Help Security Lecture Articles
 •   Help Security Lecture Note
 •   Help Security Lecture Reviews
 •   Help User
 •   Integrated Help
 •   Owning Help
 •   Purchasing Help Security Lecture
Advertisement

ALL RESULTS
1 - 25 of 489 | Next Page

Featured Sponsors

Cisco Aironet 1300 Series Outdoor Access Point/Bridge by Cisco Systems, Inc..
The Cisco® Aironet® 1300 Series Outdoor Access Point or Bridge is an 802.11g access point and bridge that provides high-speed and cost-effective wireless connectivity between more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine – April 2014 by SearchSecurity.com

April 01, 2014 - (Free Research)
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks. 
(EZINE) READ ABSTRACT |

Information Security Magazine – March 2014 by SearchSecurity.com

March 03, 2014 - (Free Research)
In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation. 
(EZINE) READ ABSTRACT |

Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development. by IBM

October 2008 - (Free Research)
This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment. 
(WHITE PAPER)

Shouldn't Single Sign-on Be Child's Play? by Microsoft & Quest Software

October 2008 - (Free Research)
Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure. 
(WEBCAST) READ ABSTRACT |

Case Study: Compellent SAN earns an A+ in ROI for the University of North Texas by Dell Compellent

June 2011 - (Free Research)
UNT needed to deploy a new SAN that could meet the performance, ease-of-management, and cost requirements. In the search for the right solution, they went through an extensive cost of ownership analysis of the competing vendors. Read this Case Study to learn more about the solution they found. 
(CASE STUDY) READ ABSTRACT |

Rational Team Concert Distance Learning by IBM

August 2013 - (Free Research)
Register to access this exclusive, instructor-led workshop delivered in five half-day sessions via a virtual classroom, so you can learn to use IBM Rational Team Concert in a z/OS enterprise environment. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Learning Computing: Why object orientated programming works. by ComputerWeekly.com

January 2012 - (Free Research)
Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Own the Air: Testing Aruba Networks’ Adaptive Radio Management (ARM) in a High-Density Client Environment by Aruba Networks

July 2010 - (Free Research)
Aruba commissioned Network Test to evaluate the efficiency of Adaptive Radio Management (ARM) features. Using a massive over-the-air test bed1, Network Test assessed ARM features both individually and in concert, in the latter case using strict adherence to service-level agreements as one of the key metrics. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Ways You Can Improve Communications with Video Conferencing by LifeSize

September 2012 - (Free Research)
This resource explores the top ten benefits of using video conferencing to bring your globally dispersed team together anytime, anywhere to collaborate efficiently and effectively. 
(WHITE PAPER) READ ABSTRACT |

Defender 5 by Dell Software

Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software. 
(ASP & SOFTWARE PRODUCT)

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

IBM Security Services Client Reference Guide by IBM

November 2013 - (Free Research)
This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges. 
(WHITE PAPER) READ ABSTRACT |

Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension

February 2013 - (Free Research)
This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more. 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Emerging security threats: Know your enemy in 2014 by Imperva

April 2014 - (Free Research)
In this presentation transcript, Johannes Ulrich, Dean of Research at the SANS technology institute, discusses new spearfishing attacks and explains how utilizing DNS logs can help organizations keep their network secure from these devastating new threats. 
(TRANSCRIPT) READ ABSTRACT |

Log Management: How to Develop the Right Strategy for Business and Compliance by Dell SecureWorks UK

August 2010 - (Free Research)
Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process. 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

Sophisticated Attacks - The Four Things you Can do now to Help Keep Your Organization Safe by IBM

May 2013 - (Free Research)
This guide takes a look at IT staff shortages and how managed security services providers (MSSPs) can help minimize issues with the technical skills dilemma. 
(WHITE PAPER) READ ABSTRACT |

Extending Security Intelligence with Big Data solutions by IBM

January 2013 - (Free Research)
Cybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals. 
(WHITE PAPER) READ ABSTRACT |

IBM Security Priviledged Identity Management by IBM

November 2012 - (Free Research)
This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security. 
(WHITE PAPER) READ ABSTRACT |

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely by Cisco (E-mail this company)

June 2011 - (Free Research)
Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management. 
(WHITE PAPER) READ ABSTRACT |

Evolving Security: 5 Reasons to Outsource Network Security Management in Today's Threat Environment by XO Communications

April 2012 - (Free Research)
Discover five reasons why outsourcing your network security management can help you combat malware, hackers, and the evolving threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

BYOD: Device Freedom Without Compromising the IT Network by Cisco (E-mail this company)

May 2013 - (Free Research)
Uncover the drivers, benefits, and challenges of Bring Your Own Device (BYOD) and learn how – with the right solution – you can keep your employees happy and organisation safe at the same time. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 489 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts