Methodology Security IssuesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Methodology Security Issues returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Intelligence Solutions
 •   Network Security
 •   Storage Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Anti-Virus Solutions
 •   Testing and Analysis

Related Searches
 •   Billing Methodology
 •   Computers Methodology Security
 •   Downloads Methodology Security Issues
 •   Methodology Security Buying
 •   Methodology Security Issues Buys
 •   Methodology Security Issues Fact
 •   Methodology Security Issues Problem
 •   Methodology Security Issues Tutorial
 •   Methodology Security Pennsylvania
 •   Methodology Security Softwares
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly 11 October 2011: Download this week's issue of the UK's leading technology publication, featuring the latest news, analysis and opinion on the big trends in IT by ComputerWeekly.com

October 11, 2011 - (Free Research)
In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now. 
(EZINE) READ ABSTRACT |

Information Security Magazine - September 2009: Readers’ Choice Awards by Information Security Magazine

September 15, 2009 - (Free Research)
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more. 
(EZINE)

Governance, Risk, Compliance: Policy Management Methods and Tools by Symantec Corporation

December 11, 2009 - (Free Research)
IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions. 
(EBOOK) READ ABSTRACT |

Tip Guide: Agile Problem Areas that Pain Developers and Testers by CollabNet

April 17, 2012 - (Free Research)
Read this expert article to learn about common challenges that developers and testers face when it comes to Agile methodology. Compare your Agile pain points to those of other development teams and discover the best way to overcome them. 
(EGUIDE) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 1 by SearchBusinessAnalytics

January 2012 - (Free Research)
The inaugural issue of BI Trends & Strategies offers sound advice to help you in ensuring your organization is on track to keep up with the rapidly changing landscape of BI and analytics. In this issue, readers will learn about a big data definition and the impact it will have on BI and data warehousing, agile development methodology and more. 
(EZINE)

Data Deduplication Background: A Technical White Paper by Quantum Corporation

February 2011 - (Free Research)
The term “data deduplication”, as it is used and implemented by Quantum Corporation in this white paper, refers to a specific approach to data reduction built on a methodology that systematically substitutes reference pointers for redundant variable-length blocks (or data segments) in a specific dataset. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Integrating Vulnerability Assessment and Remediation by Lumension

August 2008 - (Free Research)
An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies. 
(WHITE PAPER) READ ABSTRACT |

Service Management Virtual Simulation (tool) by IBM

December 2009 - (Free Research)
Check out this virtual forum to access papers and podcasts pertaining to dynamic infrastructure solutions from IBM. 
(RESOURCE CENTER)

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA by SearchSoftwareQuality.com

May 2009 - (Free Research)
In this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology. 
(EZINE)

E-Book: New trends and best practices for data governance success by Talend

November 2010 - (Free Research)
This eBook examines data governance trends and methodologies for managing governance programs. It covers issues such as new ways of organizing data governance teams and emerging best practices to help organizations succeed with enterprise data governance initiatives. It also provides expert advice on how to design and implement governance programs. 
(EBOOK)

Guidance for Calculation of Efficiency (PUE) in Data Centres by APC by Schneider Electric

December 2011 - (Free Research)
The efficiency ratings of a data centre can vary substantially depending on what methodologies are applied. Access this exclusive resource to discover the importance of measuring data centre efficiency and learn about the issues companies face when establishing the PUE of an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA by IBM

December 2010 - (Free Research)
In this issue of SearchSoftwareQuality.com's Software Testing e-zine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology. 
(EZINE)

Secure Web Gateway Deployment Methodologies by BlueCoat

September 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Developing and Optimizing Threaded Applications by Intel Corporation

June 2007 - (Free Research)
Threading continues to be a challenge for many organizations today. This white paper presents a methodology that has been used to successfully thread many applications and discusses tools can assist in developing multi-threaded applications. 
(WHITE PAPER)

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Globalization of a Web-Delivered Survey Application by Globalization Partners International

May 2008 - (Free Research)
WorldInquiry's web application had several mission critical internationalization and localization issues, which Globalization Partners handled. 
(CASE STUDY) READ ABSTRACT |

Improving Intercompany Reconciliation for a Faster Close by SAP America, Inc.

June 2009 - (Free Research)
What's arguably the single greatest barrier to the fast close has remained constant - the completion of the intercompany reconciliation process. This paper examines the issues behind intercompany reconciliation and outlines how companies can make impressive progress when they employ software solutions such as those from SAP Business Objects 
(WHITE PAPER) READ ABSTRACT |

Selecting ALM tools for your organization by CA Technologies.

June 2012 - (Free Research)
Read this expert e-guide to discover: a breakdown of the types of ALM tools that are available to help manage software testing processes− including market leaders and niche players that address specific issues; three key considerations to keep in mind when evaluating ALM tools; and more! 
(EGUIDE) READ ABSTRACT |

Improved Chilled Water Piping Distribution Methodology for Data Centers by Schneider Electric

October 2011 - (Free Research)
This white paper details the issues involved with chilled water piping and offers flexible piping as a reliable solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts