White Paper HomelandWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Paper Homeland returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Homeland Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Manual White Paper
 •   Regional White Paper
 •   Technology White
 •   White Paper Canada
 •   White Paper Homeland Costing
 •   White Paper Homeland Office
 •   White Paper Infrastructure
 •   White Paper Integration
 •   White Paper Pennsylvania
 •   White Paper Test
Advertisement

ALL RESULTS
1 - 25 of 493 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Protect citizen data with IBM Rational software by IBM

July 24, 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 24, 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

Solving Security Challenges for Government Cloud-Based IT Environments by Red Hat

December 30, 2011 - (Free Research)
Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits. 
(WHITE PAPER) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 01, 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Reduce Fraud, Waste and Abuse with Flexible Analytics by SAP America, Inc.

June 27, 2012 - (Free Research)
This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more. 
(WHITE PAPER) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 07, 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

MapXTreme Java Edition Data Sheet by Pitney Bowes Business Insight

January 01, 2007 - (Free Research)
MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet. 
(DATA SHEET) READ ABSTRACT |

Watch It: How to Do Video Surveillance for a Higher ROI by Cisco Systems, Inc.

January 21, 2011 - (Free Research)
Video surveillance helps keep an eye on things. But what is its return on investment (ROI) at your business? The technology that you use determines the value you can get. In comparison to cloud-circuit television (CCTV), the increasingly popular digital IP video surveillance offers more ROI. Continue reading this paper to find out why. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

A Hack Attack: Six Steps to Recovery by Cisco Systems, Inc.

January 21, 2011 - (Free Research)
It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself. 
(WHITE PAPER) READ ABSTRACT |

How White Papers Can Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

October 2006 - (Free Research)
In this presentation document, white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating effective white papers that attract prospects in droves. 
(ANALYST REPORT) READ ABSTRACT |

How White Papers Can Turbo-Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
In this upcoming Webcast, "How White Papers Can Turbo-Boost Your Lead Gen Campaigns", white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating white papers that attract prospects in droves. This Webcast is presented by KnowledgeStorm. 
(WEBCAST) READ ABSTRACT |

Podcast - Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

March 2006 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This podcast outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(PODCAST) READ ABSTRACT |

Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

May 2005 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This paper outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

True Enterprise-Quality Linux Support: Edison Group White Paper by Oracle Corporation

November 2008 - (Free Research)
This white paper discovers how organization can increase operational efficiency while cutting costs with Oracle Unbreakable Linux, a support program that delivers enterprise-quality support for Linux at a lower cost. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Background: A Technical White Paper by Quantum Corporation

March 2011 - (Free Research)
The purpose of data deduplication is to increase the amount of information that can be stored on disk arrays and to increase the effective amount of data that can be transmitted over networks. Read this white paper from Quantum Corporation to learn more about data deduplication today. 
(WHITE PAPER) READ ABSTRACT |

Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector by Hewlett-Packard Company

September 2006 - (Free Research)
Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology. 
(WHITE PAPER) READ ABSTRACT |

CA White Paper: Getting Started with a Project Management Office (PMO) by CA Technologies.

September 2007 - (Free Research)
This paper contains practical insights and best practices for better IT project delivery. It details ways of moving from an ad-hoc approach to a more effective process by implementing a project management office (PMO). 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: The Evolution of Job Scheduling - CA's Approach to Workload Automation by CA Technologies.

February 2008 - (Free Research)
This IDC paper presents the key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. 
(WHITE PAPER) READ ABSTRACT |

Datalink's White Paper Library by Datalink and NetApp

May 2010 - (Free Research)
Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data. 
(INFORMATION CENTER) READ ABSTRACT |

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians by Imprivata

December 2012 - (Free Research)
Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation. 
(WHITE PAPER) READ ABSTRACT |

The Economics of Networking White Paper by Cisco Systems, Inc.

February 2012 - (Free Research)
Access this white paper to learn about a next-generation network architecture that paves the way for true business innovation with architectural benefits that empower IT to say “yes” to new business opportunities and the ever-changing work environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 493 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts