IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

CERT

RSS Feed    Add to Google    Add to My Yahoo!
CERTWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

SysML-Based Systems Engineering Using a Model-Driven Development Approach
sponsored by IBM
WHITE PAPER: This paper describes a SysML-based (Systems Modeling Language) process that systems engineers can use to capture requirements and specify architecture. The approach uses model execution as a means for requirements verification and validation.
Posted: 23 Feb 2009 | Published: 01 Oct 2008

IBM

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by SearchSecurity.com
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor.
Posted: 09 May 2012 | Published: 09 May 2012

Symantec Corporation

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

How to tackle cloud, IAM, and digital certificate problems in your organization
sponsored by SearchSecurity.com
EBOOK: In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

IBM FlashSystem Database Mirroring Best Practices
sponsored by IBM
WHITE PAPER: This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability.
Posted: 18 Apr 2014 | Published: 30 Apr 2013

IBM

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SearchSecurity.com

Threat Intelligence and Data Solutions for your Security Strategy
sponsored by Dell SecureWorks UK
WHITE PAPER: This paper will discuss the benefits of threat intelligence for both the enterprise and individual security professionals, plus what costs organizations to not have threat intelligence.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell SecureWorks UK

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
WHITE PAPER: The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Websense, Inc.

Red Hat OpenStack Administration (CL210)
sponsored by Red Hat
WHITE PAPER: This course teaches system administrators and those responsible for managing a cloud how to implement a cloud computing environment using Red Hat® Enterprise Linux® OpenStack® Platform, including installation, configuration, and maintenance.
Posted: 20 May 2014 | Published: 20 May 2014

Red Hat

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

The BMC and IPMI Vulnerabilities
sponsored by Avocent
WHITE PAPER: Recent analyst studies have shown that there are potential security flaws in BMCs, also known as service processors, and the Intelligent Platform Management Interface protocol. Read this whitepaper to learn how you can contain the risk.
Posted: 13 May 2014 | Published: 31 Dec 2013

Avocent

See What CDI Success Looks Like
sponsored by Nuance
WHITE PAPER: This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Nuance

Three Ways System Downtime Affects Companies and Four Methods to Minimize It
sponsored by GlobalScape
WHITE PAPER: This white paper explains the top 3 ways downtime will negatively impact organizations, and offers 4 steps to help you improve security and availability of your systems.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

MicroScope July 2014: An issue covering changes in the business intelligence market
sponsored by MicroScope
EZINE: An issue highlighting the changing business intelligence market and the opportunities for resellers
Posted: 14 Jul 2014 | Published: 11 Jul 2014

MicroScope

How to handle requirements for risk assessment methodologies
sponsored by ComputerWeekly.com
WHITE PAPER: Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Is the mobile gambling market still a safe bet for business?
sponsored by ComputerWeekly.com
WHITE PAPER: This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.”
Posted: 24 Oct 2011 | Published: 30 Nov 2010

ComputerWeekly.com

Justifying a Computer Incident Response Plan
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now.
Posted: 07 Feb 2013 | Published: 07 Feb 2013

Dell SecureWorks UK

Step by Step: Best practices for security patch management
sponsored by SearchSecurity.com
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement