Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Advertising SoftwareWhite Papers (View All Report Types)
 
Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Economics of Cloud Financial Software
sponsored by Intacct Corporation
WHITE PAPER: Find out which financial applications software is the best fit for your business needs.
Posted: 23 May 2014 | Published: 31 Dec 2013

Intacct Corporation

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett-Packard Company
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett-Packard Company

The File Transfer Security Evolution
sponsored by GlobalScape
WHITE PAPER: This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
Posted: 27 May 2014 | Published: 31 Dec 2013

GlobalScape

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

The Nonprofit CFO's Survival Guide
sponsored by Intacct Corporation
WHITE PAPER: Uncover the top nonprofit CFO challenges and unusual constraints of their financial management, as well as tips and best practices to overcome such challenges from nonprofit finance experts.
Posted: 27 May 2014 | Published: 31 Dec 2012

Intacct Corporation

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Microsoft Extends Windows® XP Malware Support-Compliance Issues Remain
sponsored by Lenovo and Microsoft
WHITE PAPER: This informative guide explores the risks associated with Windows® XP and why now is the time to upgrade your operating system – ensuring system security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Lenovo and Microsoft

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement