Layered PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Layered Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Network Security
 •   Network Management
 •   Data Security
 •   Virtualization
 •   Firewalls
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Security Monitoring
 •   Networks

Related Searches
 •   Commercial Layered Paper
 •   Contracts Layered Paper
 •   Layered Paper Contracts
 •   Layered Paper Decisions
 •   Layered Paper Firm
 •   Layered Paper Making
 •   Layered Payment
 •   Layered Strategies
 •   Manuals Layered Paper
 •   Using Layered Paper
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The OSI Model: Understanding the Seven Layers of Computer Networks by Global Knowledge

July 2006 - (Free Research)
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking. 
(WHITE PAPER) READ ABSTRACT |

Address performance and capacity issues by deploying a virtual infrastructure for SAP by VMware, Inc.

March 2009 - (Free Research)
This white paper describes technical and business considerations for deploying a virtual infrastructure for SAP landscapes with EMC and VMware technologies. The white paper addresses a variety of key considerations for deploying such an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Layered Security: Protecting Your Data in Today's Threat Landscape by Tripwire, Inc.

November 2011 - (Free Research)
In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

The Ten Layers of Security in BIRT iHub by Actuate

June 2014 - (Free Research)
The following white paper explores the 10 layers of security in the BIRT iHub. Learn how to manage each layer successfully, how to enable central configuration, and more. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

In Control at Layer 2: A Tectonic Shift in Network Security by SafeNet, Inc.

November 2013 - (Free Research)
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data. 
(WHITE PAPER) READ ABSTRACT |

Cloud Infrastructure Foundation - A Flexible, Responsive Cloud Is Built from the Ground Up by Egenera

November 2010 - (Free Research)
At its heart, cloud computing is a new operational and business model for IT application hosting, rather than a new technology. It promises to deliver highly reliable, highly elastic services that respond quickly and smoothly to changing user demand. 
(WHITE PAPER) READ ABSTRACT |

Multi-Layer Security Platforms: The New Definition of Best of Breed by Fortinet, Inc.

June 2006 - (Free Research)
Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution. 
(WHITE PAPER) READ ABSTRACT |

Mitigating DDoS Attacks with F5 Technology by F5 Networks

July 2013 - (Free Research)
This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks. 
(WHITE PAPER) READ ABSTRACT |

Database Middleware: Struggling with Performance? by Progress DataDirect

February 2011 - (Free Research)
Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses. 
(WHITE PAPER) READ ABSTRACT |

Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications by VeriSign EMEA

November 2007 - (Free Research)
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues. 
(WHITE PAPER) READ ABSTRACT |

Data Abstraction Best Practices by Composite Software

March 2011 - (Free Research)
Data abstraction overcomes data structure incompatibility by transforming data from its native structure and syntax into reusable views and data services. But some data abstraction approaches work better than others. Composite data virtualization is an optimal way to implement an abstraction layer at enterprise scale. 
(WHITE PAPER) READ ABSTRACT |

Cloud Infrastructure Matters by Red Hat and HP

March 2011 - (Free Research)
New IT technologies and abstractions, such as cloud computing, layer on top of existing ones.This may make the foundational layers less visible, but they remain just as important (or even more so). This paper looks at some of the ways that volume processors have improved their error-handling ability by improving their cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

When Availability Matters: Change Control for SaaS Providers by Tenzing Managed IT Services

December 2010 - (Free Research)
This paper examines that to build an effective change management framework and achieve high availability numbers for an SaaS application requires maturing IT processes along established best practices and investing in quality change management tools. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Integration of Microsoft Hyper-V and Coraid Ethernet SAN Storage by Coraid

August 2011 - (Free Research)
Data centers are going through massive changes at the compute layer. Server virtualization is transforming the IT landscape achieving amazing improvements in price-performance and agility. However, realizing the price-performance and agility benefits of virtualization at the storage layer can be a challenge. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

iSCSI vs. Fibre Channel: Three Reasons Not To Choose Either by Coraid

April 2011 - (Free Research)
Fibre Channel and iSCSI storage systems are not delivering the price-performance and agility at the storage layer required to keep up with the new virtualized compute layer. This paper explores a third storage networking technology, Ethernet SAN, and why you don’t have to choose between iSCSI and Fibre Channel. 
(WHITE PAPER) READ ABSTRACT |

Implementing HA at the Enterprise Data Center Edge to Connect to a Large Number of Branch Offices by Juniper Networks, Inc.

December 2008 - (Free Research)
This paper explains how to deploy a highly available, working cluster by taking the design considerations and applying them to an actual deployment. 
(WHITE PAPER) READ ABSTRACT |

Databases and ERP Selection: Oracle Vs. SQL Server by IFS

January 2012 - (Free Research)
In this paper, learn why the database layer is so important to the software selection of an enterprise resource planning (ERP) system. Also compare Oracle database to SQL Server databases. 
(WHITE PAPER) READ ABSTRACT |

Top 7 Business Reasons for Tapping Your Fibre Channel SAN by Virtual Instruments

May 2011 - (Free Research)
Rapid increases in both the operating speeds and general complexity of SAN technologies, exacerbated by the high change rates demanded of enterprise IT organizations, significantly increase demands on the fiber optic physical layer. Check out this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Backup Security by Quantum Corporation

April 2006 - (Free Research)
Regardless of your organization's size, data security is becoming one of the biggest challenges in IT today. Get an overview on how to address backup security through tips and best practices. 
(WHITE PAPER)

OMEGAMON Extended Insight- Analysis: Where is your application spending time? by IBM

December 2011 - (Free Research)
The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications. 
(WHITE PAPER) READ ABSTRACT |

SANS Institute: Oracle Database Security, What to Look for and Where to Secure by Oracle Corporation

June 2010 - (Free Research)
To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts