Online Payment Using FunctionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Online Payment Using Functions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Network Security
 •   Mobile Device Management
 •   Storage Management

Related Searches
 •   Erp Online Payment Using
 •   Migration Online Payment
 •   Note Online
 •   Online Compare
 •   Online Filing
 •   Online Payment Activity
 •   Online Payment Processing
 •   Online Payment Suite
 •   Small Online
 •   Web-Based Online Payment Using
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Bango Meets Their Big Data Challenge: Improving Mobile Analytics and Driving Online Business by Infobright, Inc.

November 28, 2012 - (Free Research)
Meeting the demands for instant access to business data is something most of IT today struggles with. Read this transcript to discover how one company overcame this challenge with an analytical database capable of analyzing large data sets and learn how it simplified their database admin and provided the real-time data access they needed. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Mobile banking strategies - maximise your revenues by ComputerWeekly.com

December 2010 - (Free Research)
Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”. 
(WHITE PAPER) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy by Trend Micro, Inc.

October 2010 - (Free Research)
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

The future of Government operations: Digital citizen survey by ComputerWeekly.com

May 2012 - (Free Research)
This report from Accenture looks at the challenges facing the public sector in offering digital services. 
(IT BRIEFING) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine Online November 2012 – Storage Salary Survey Results Revealed by SearchStorage.com

November 2012 - (Free Research)
In the November 2012 Storage Magazine, find the results of this year’s annual Storage Salary Survey and find expert articles from Rich Castagna, Jon Toigo, Terri McClure and others addressing BYOD, storage clouds, LTFS, NAS upgrades and much more. 
(EZINE) READ ABSTRACT |

Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud by Bluelock

May 2012 - (Free Research)
One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services. 
(WHITE PAPER) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Protecting SharePoint with Double-Take for Windows 5.0 by Double-Take Software

April 2008 - (Free Research)
Download this whitepaper today to learn how to use Double-Take Software as a cost efficient way to protect your SharePoint data and access. When recoverability matters, depend on Double-Take Software to dynamically move, protect, and recover your critical applications. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall by Riverbed Technology, Inc.

January 2012 - (Free Research)
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6. 
(WHITE PAPER) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Payment Card Industry (PCI) Data Security Standard for System i AS400 by Bsafe Information Systems

February 2008 - (Free Research)
This document is supported by Bsafe/ES Modules such as Bsafe Network Log, Bsafe Analyzer, Bsafe Traffic Analyzer, Bsafe Archive Central Audit, Bsafe Simulator, Bsafe IDS (alerts) and Bsafe IPS. 
(WHITE PAPER) READ ABSTRACT |

Payment Card Industry (PCI) Data Security Standard by Bsafe Information Systems

February 2008 - (Free Research)
This document is supported by Bsafe/ES Modules such as Bsafe Network Log, Bsafe Analyzer, Bsafe Traffic Analyzer, Bsafe Archive Central Audit, Bsafe Simulator, Bsafe IDS (alerts) and Bsafe IPS. 
(WHITE PAPER) READ ABSTRACT |

NCR 2010 Consumer Research Reveals that Patients Want Self-Service to Better Manage Healthcare Expenses by NCR Corporation

September 2010 - (Free Research)
Patients seeking greater convenience when paying healthcare bills. New consumer research commissioned by NCR Corporation reveals that patients are increasingly seeking self-service convenience when managing the financial aspects of their healthcare experience. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Backup Express for Microsoft Exchange by Syncsort

September 2008 - (Free Research)
Read this paper to learn how the Backup Express Microsoft Exchange Server Application Interface works with the standard Microsoft backup API to provide a flexible, database-specific backup and restore solution for your critical Exchange data. 
(DATA SHEET) READ ABSTRACT |

TransPromo Opportunities in a Digital World: Electronic Adaptations in an Era of Mobile Communications and Distracted Customers by Pitney Bowes Group 1 Software

September 2008 - (Free Research)
This whitepaper traces the evolution of E-Transpromo, demonstrating the increasingly important role across new media. It explores self-service web portals, online banking and bill consolidators, cell phone bill pay, and secure transaction email. 
(WHITE PAPER) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Vblock Specialized System for High Performance Databases by VCE (E-mail this company)

December 2013 - (Free Research)
In this resource, discover a converged infrastructure specifically designed for demanding, high-performance databases that provides millisecond response times, continuous availability, and high flexibility. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts