Security Samples ImplementationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Samples Implementation returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Database Planning and Implementation
 •   Storage Management
 •   Security Monitoring
 •   Virtualization
 •   Application Security
 •   Business Intelligence Solutions
 •   Network Management
 •   Database Administration

Related Searches
 •   Code Security Samples
 •   Info About Security
 •   Open Security
 •   Protocol Security Samples Implementation
 •   Rfq Security Samples Implementation
 •   Security Samples Cycles
 •   Security Samples Hawaii
 •   Security Top
 •   Unix Security
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Duet Implementation: How to leverage SAP applications through your Microsoft Office Environment by Duet for Microsoft Office and SAP

May 22, 2007 - (Free Research)
Attend this Webcast to learn the various components that make up a Duet environment--a bridge between SAP applications and the Microsoft environment--as well as scalability and high availability options. 
(WEBCAST) READ ABSTRACT |

FAQ: Gain Business Advantages through Operational Analytics: Empowering Near Realtime Decision Making by IBM

July 19, 2013 - (Free Research)
In this Q and A, Dr. Barry Devlin, Founder, 9sight Consulting, will discuss the business value and technological foundations of operational analytics. He'll also explore how to bridge the business need for operational analytics with technology capabilities, as well as the business drivers for immediate decision making and action taking. 
(TRANSCRIPT) READ ABSTRACT |

Exposing the Beast - Custom API Mgt for the Enterprise by Intel Corporation

November 04, 2013 - (Free Research)
In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management. 
(WEBCAST) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 16, 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

Symantec Report on Rogue Security Software by Symantec Corporation

October 01, 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Total Economic Impact of Oracle Enterprise Manager Database Management Packs by Oracle Corporation

February 18, 2008 - (Free Research)
This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research. 
(WHITE PAPER) READ ABSTRACT |

Lower your IT Costs with Oracle Database 11g Release 2 by Oracle Corporation

October 12, 2011 - (Free Research)
This white paper contains a sampling of real business results that organizations around the world, in a variety of industries, have achieved by upgrading and standardizing on Oracle Database 11g. 
(WHITE PAPER) READ ABSTRACT |

Customers Standardize on Oracle Database 11g (Reference Booklet) by Oracle Corporation

December 20, 2010 - (Free Research)
This customer reference booklet contains a sampling of real business results that organizations around the world, in a variety of industries, have achieved by upgrading and standardizing on Oracle Database 11g.  We hope you find these success stories helpful in learning how Oracle can help you achieve your business and IT objectives. 
(WHITE PAPER) READ ABSTRACT |

Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation by SearchDataCenter.com

May 23, 2011 - (Free Research)
This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more. 
(EBOOK) READ ABSTRACT |

Antivirus Testing and AMTSO Has anything changed? by ESET

September 08, 2010 - (Free Research)
This paper looks at testing as it was, as it is, and as Anti-Malware Testing Standards Organization (AMTSO) would like it to be. Is testing really so difficult? Is it appropriate for the vendors who make the products under test to be so involved in the process of defining good practice? 
(WHITE PAPER) READ ABSTRACT |

ESET: Threat Center by ESET

September 02, 2010 - (Free Research)
IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types. 
(PRODUCT DEMO) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 17, 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Deployment Framework Best Practices by Red Hat and HP

March 01, 2012 - (Free Research)
This white paper examines various Linux configuration and deployment options. Discover key installation considerations to take into account and obtain best practices to help you execute your implementation with ease. 
(WHITE PAPER) READ ABSTRACT |

Enhance Business Insight and Scalability of XML Data with New DB2 9.7 pureXML Features by IBM

March 18, 2011 - (Free Research)
This is a developerWorks article. This article summarizes the new pureXML capabilities, explains how they can be used, and discusses sample application scenarios. 
(TECHNICAL ARTICLE) READ ABSTRACT |

IBM SOA Sandbox Trial - WebSphere eXtreme Scale by IBM

October 12, 2010 - (Free Research)
This exercise will let you see a sample WAS exercise running with standard WebSphere Application Server HTTP Session management and enhanced with eXtreme Scale HTTP Session management. 
(TRIAL SOFTWARE) READ ABSTRACT |

Cruise the Self-Service BI Highway by SearchSQLServer.com

April 25, 2014 - (Free Research)
New developments indicate Microsoft SQL Server BI trending toward a focus on self-service software, end user capabilities and better, data-driven decisions. 
(EBOOK) READ ABSTRACT |

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks by Palo Alto Networks

March 18, 2013 - (Free Research)
This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact™ of Dell's Server Virtualization Solutions by Dell, Inc. and Intel®

February 13, 2009 - (Free Research)
In late 2008, Forrester Research commenced work on a research project commissioned by Dell, Inc., that focused on examining the potential return on investment (ROI) enterprises may realize by adopting Dell's server virtualization solutions in conjunction with VMware's ESX server and virtualization platform. Read this study to discover key findings. 
(ANALYST REPORT) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 01, 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

ReferenceWare by SkillSoft Corporation

ReferenceWare – the fastest way to problem-solve and learn - provides full access to the unabridged contents of thousands of business and technology titles in a searchable, collaborative environment! 
(SOFTWARE PRODUCT)

Red Hat Cloud Foundations Reference Architecture: Private IaaS Clouds by Red Hat and JBoss

February 10, 2011 - (Free Research)
Red Hat's suite of open source software provides a rich infrastructure for cloud providers to build public/private cloud offerings. This Volume 1 guide for deploying the Red Hat infrastructure for a private cloud describes the foundation for building a Red Hat Private cloud. 
(WHITE PAPER) READ ABSTRACT |

How to Certify or Re-certify Twisted-Pair Cabling for 10 Gb/s Ethernet by Fluke Networks

June 2008 - (Free Research)
This paper provides a background and an overview of the performance requirements for the twisted-pair cabling and methods to measure and certify the performance of the installed cabling system. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Cloud Foundations, HP Edition: Private IaaS Clouds by Red Hat and HP

March 2011 - (Free Research)
Red Hat's suite of open source software provides a rich infrastructure for cloud providers to build public/private cloud offerings. This Volume 1 guide for deploying the Red Hat infrastructure for a private cloud describes the foundation for building a Red Hat Private cloud. 
(TRAINING GUIDE) READ ABSTRACT |

Making the Right Move to a Managed Service Provider for SSL VPN by MegaPath Inc.

March 2010 - (Free Research)
Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts