Online Examples AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Online Examples Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Network Security
 •   Data Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Endpoint Security
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Managed Security Services

Related Searches
 •   Functions Online Examples Assessment
 •   Learn About Online Examples Assessment
 •   Online Examples Assessment Integrated
 •   Online Examples Frameworks
 •   Online Examples Iowa
 •   Online Examples Processing
 •   Online Examples Test
 •   Online Terms
 •   Projects Online Examples Assessment
 •   Skills Online Examples Assessment
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 18, 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Oracle Exadata Online Forum by Oracle Corporation

February 2011 - (Free Research)
Access this Oracle Exadata Online Forum, where Oracle executives, customers, and industry experts come together to share what extreme performance really means for your business. 
(INFORMATION CENTER)

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com

August 2009 - (Free Research)
As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more. 
(EBOOK) READ ABSTRACT |

Web-facing applications: Security assessment tools and strategies by SearchSecurity.com

October 2012 - (Free Research)
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Quest Migration Assessment Tool (QMAT) by Dell Software

July 2012 - (Free Research)
Take advantage of this exclusive assessment tool to easily compare top messaging platforms so you can determine which one fits your organization's needs. 
(ASSESSMENT TOOL) READ ABSTRACT |

ERP Assessment and Selection: Get It Right the First Time by Panorama Consulting Group

September 2009 - (Free Research)
Read this white paper for several great tips for selecting the right ERP vendor for your organization. This paper breaks the process down into easy-to-follow steps, beginning with the basic questions decision-makers should ask. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Boosting Website Performance by Limelight Networks, Inc.

April 2010 - (Free Research)
Join Limelight Networks VP of Strategic Alliances, Adam Wray, Senior Product Manager, Ken Iversen, and Integration Consultant Lead, Derek Boonstra as they discuss key strategies for cost-effectively boosting site performance without compromising on user experience. 
(WEBCAST) READ ABSTRACT |

ROI for the Online Channel: The Business Drivers for Your Investments in WCM Technology by SDL Web Content Management Solutions Division

June 2009 - (Free Research)
This document provides you with the knowledge you need to make the connections between the SDL Tridion Web Content Management solution and its effects on your business. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust by VeriSign Australia

August 2010 - (Free Research)
This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

Take the Modernization Impact Assessment by Hewlett-Packard Company

October 2013 - (Free Research)
Take this online assessment today to discover the impact that modernization can have on your organization's IT environment, and find out what you can do to plan for modernization success. 
(ASSESSMENT TOOL) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Malware Security Report: Protecting Your Business, Customers and Bottom Line by VeriSign Australia

August 2010 - (Free Research)
This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them. 
(WHITE PAPER) READ ABSTRACT |

Online Content Speaks Volumes by Sitecore

July 2008 - (Free Research)
This whitepaper examines the results of a survey by Aberdeen in which 300+ executives, users, and managers of online content management systems were asked the methods they use for building their web content management and delivery models. 
(WHITE PAPER) READ ABSTRACT |

World-Class Storage Team Solves Top Challenges in a Large-Scale SANscreen Deployment by NetApp

March 2010 - (Free Research)
Angelica Brown led a world-class team of storage technologists supporting one of the largest online storage infrastructures. She implemented best-of-breed storage resource management tools to help increase staff efficiency. This is where SANscreen® comes in. 
(CASE STUDY) READ ABSTRACT |

Online Data Warehousing Assessment Tool by Oracle Corporation

October 2010 - (Free Research)
This tool offers you a better understanding of your organization’s ability to manage growing volumes of information. It only takes a few minutes to answer these questions and receive your score. Try it now. 
(ASSESSMENT TOOL) READ ABSTRACT |

Nine Real-World Results from Testing and Targeting by WebTrends (E-mail this company)

April 2013 - (Free Research)
In today's wired world, you must make sure your website is optimized for optimal ROI and sales.  Check out this white paper to learn about the business case of web site optimization, and learn from nine brief success stories of businesses across all sectors. 
(WHITE PAPER) READ ABSTRACT |

How to Implement a Data Loss Prevention Strategy by Sophos, Inc.

April 2010 - (Free Research)
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by looking at what’s driving data loss prevention, the consequences of data loss, and a possible solution. It then moves on to practical implementation advice and examples. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Enterprise Virtualization TCO Calculator by Red Hat & IBM

February 2012 - (Free Research)
With this online virtualization assessment tool, discover the potential savings your business stands to gain from deploying Red Hat Enterprise Virtualization (RHEV) technology in your data center. Customize each setting to gain a detailed ROI analysis and TCO comparison for your business. 
(ASSESSMENT TOOL) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

How Micro-Electro-Mechanical systems are taking over mobile devices by ComputerWeekly.com

February 2012 - (Free Research)
In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts