Search Results for: security_tutorial

Sharpen your DevOps edge
In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.

TechTarget ComputerWeekly.com

Building a Better Data Backup Plan: This year's hottest backup trends
To help you build the best backup plan for the new year, read this special report by features writer Carol Sliwa on the hottest backup trends. Learn about what's new in backup software, backup hardware and backup outsourcing. Read on to learn more.

NETGEAR Inc.

Cloud Security as a Service For Secure Cloud-Based Server Hosting
Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.

TechTarget Security

The Transformation of Wireless Network Security
This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.

TechTarget Security

Cloud Backup Tutorial: How to Leverage Cloud Backup Services
This expert e-guide highlights the pros and cons of cloud backup services, how cloud storage is changing data protection and disaster recovery, and more.

eFolder

Your UCaaS Checklist
Evaluating UCaaS providers and cloud-based products can be overwhelming, especially as market growth continues throughout 2018. Access this e-guide to uncover 3 areas of criteria when assessing UCaaS vendors and learn how to ensure top security measures are in place, so you can embrace the many inherent benefits of UCaaS.

Intermedia Net

IP telephony trends: Migrating from PSTN to SIP trunking
Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.

TechTarget Security

How to Create a Mobile Security Policy
This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.

TechTarget Security

Cross Site Scripting
This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

Imperva