Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Advertising Software White Papers (View All Report Types)
 
Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

One Great Firewall Analyzed in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the information you need about a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

Test Results for a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

5 Criteria for Choosing Enterprise Agile Development Software
sponsored by CA Technologies
WHITE PAPER: Learn how to evaluate and select an Agile software development platform that best suits your organization by uncovering 5 key criteria to consider.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

CA Technologies

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

3 Reasons Why You Should Invest in a Component-Based Architecture
sponsored by OutSystems
WHITE PAPER: Learn about the movement towards low-code platforms and what it means to adopt a component-based architecture. Plus, find out how to build apps faster while writing less code, minimizing time spent debugging and updating apps, and taking advantage of developers' specialized skills.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

OutSystems

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement