IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DDoS Attacks

RSS Feed    Add to Google    Add to My Yahoo!
DDoS AttacksWhite Papers (View All Report Types)
 
10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks

Web Security: Protecting the Heart of Your Business
sponsored by Akamai Technologies
WHITE PAPER: In this study conducted by Forrester Research, Inc., learn how organizations in the US and Europe understand the impact of cyberattacks and specifically the role DDoS and web application attacks have on their business.
Posted: 11 Nov 2014 | Published: 31 Aug 2014

Akamai Technologies

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy.
Posted: 01 Apr 2014 | Published: 28 Feb 2011

Dell SecureWorks

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Comprehensive Protection for Email and Web: The World's Most Critical Business Applications
sponsored by Fortinet, Inc.
WHITE PAPER: Email and the web have revolutionized business communication, providing an unmatched blend of reach, scalability, timeliness, efficiency and overall effectiveness.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Posted: 19 Aug 2009 | Published: 03 Aug 2009

Imperva

Features of a Comprehensive Application Security Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the features of a comprehensive application security solution.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Citrix

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement