Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities White Papers (View All Report Types)
 
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Global Sourcing Trends in 2012
sponsored by ComputerWeekly.com
IT BRIEFING: The latest IT outsourcing trends from global law firm Morrison & Foerster.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

ComputerWeekly.com

Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Enterprise Mobility: A Framework for Success
sponsored by Dimension Data
BOOK: Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Dimension Data

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide discusses how effective policies can solve corporate mobile device security issues, and why these policies are better at protecting smartphones than an MDM solution.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchSecurity.com

Case Study - NVIDIA Enables True SAP Security
sponsored by Onapsis
WHITE PAPER: This whitepaper explains how NVIDIA, a well-known GPU and SOC technology provider, was able to gain the capabilities needed to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.
Posted: 22 Oct 2014 | Published: 22 Oct 2014


Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

The Global State of Information Security Survey 2013: Key Findings
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.
Posted: 09 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

The Global State of Enterprise Mobility 2014/15
sponsored by ComputerWeekly.com
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

What Does the Cloud Mean for Enterprise Security?
sponsored by Zscaler
WHITE PAPER: Download this exclusive white paper now to learn about the evolution of security threats and the role of the cloud in fighting back.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Zscaler

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Next Generation Datacentres: The Cloud
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey reveal the latest research on the deployment of cloud in the datacentre.
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

Tackling Mobile Security and BYOD Risks
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

CIO Decisions E-Zine - February 2015
sponsored by SearchCIO.com
EZINE: When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.
Posted: 04 Feb 2015 | Published: 30 Jan 2015

SearchCIO.com

Protecting Your Mid-Size Business from Today’s Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper takes a look at the importance of securing your business from a midmarket perspective.
Posted: 16 May 2014 | Published: 16 May 2014

Hewlett-Packard Company

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Breach Detection: What You Need to Know
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important e-book explores the tactics advanced attackers use to break into your organization and how a defense-in-depth cyber-security program with automatic detection and incident response can help you fight back.
Posted: 15 Jan 2015 | Published: 16 Jan 2014

Bit9 + Carbon Black

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement