Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software White Papers (View All Report Types)
126 - 150 of 607 Matches Previous Page  |  Next Page
Creating a Robust Data Ontology
sponsored by Metavine
WHITE PAPER: This paper explores how to regain control over your data in SaaS environments without compromising your hybrid or cloud app strategies. Learn how you can create an enterprise-level data ontology, leverage data-as-a-service (DaaS), build microservices, and achieve a true zero-code development environment to unlock greater levels of agility.
Posted: 28 Nov 2016 | Published: 23 Nov 2016

Metavine

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

CW+: IDC Report - How to manage documents in the enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: In recent years C-level executives in many of the world's largest and most successful organizations have been forced to introduce a wide range of cost-cutting measures as macroeconomic forces continue to create a challenging and uncertain trading environment.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

DDoS Attack: Smoke Screen or Smoke Signal?
sponsored by Arbor Networks
WHITE PAPER: Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.
Posted: 17 Aug 2016 | Published: 08 Apr 2016

Arbor Networks

Definitive Guide to Security Intelligence and Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

LogRhythm, Inc.

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendors are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

Comprehensive Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This white paper details conprehensive security for today's changing data centers including virtualized network and cloud computing.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM and Juniper

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Customer Perspectives on the Benefits of a Collaborative Process to Deliver Software Quality
sponsored by IBM
WHITE PAPER: This Hurwitz and Associates whitepaper shares the successes, challenges and future plans of three companies - Sogeti Group, Accident Compensation Corporation (ACC), and Scotiabank.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

Customer Relationship Management - Integration for a Customer Centric View
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper provides a valuable list of factors for executive management, IT decision makers and sales professionals to consider when planning a successful CRM integration project.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Sage (UK) Limited

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Dashboard Software Buyers Guide
sponsored by LogiXML
WHITE PAPER: This paper will guide you through the process of understanding organizational requirements, which will dictate which software is the best fit to meet your needs and accomplish your goals. Based on these organizational requirements, we provide an evaluation checklist to evaluate various solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

LogiXML

Data Protection Solution-Taking Control of Your Data
sponsored by Lumension
WHITE PAPER: Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Posted: 12 Aug 2009 | Published: 30 Oct 2008

Lumension

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Hexis Cyber Solutions Inc

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by Dell, Inc.
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

Dell, Inc.
126 - 150 of 607 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement