Standards  >   Internet Standards  >   Web Protocols  >  

HTTP over Secure Socket Layer

RSS Feed    Add to Google    Add to My Yahoo!
HTTP over Secure Socket Layer White Papers (View All Report Types)
 
Geek Guide: Apache Web Servers and SSL Authentication
sponsored by GeoTrust, Inc.
WHITE PAPER: This guide walks through what SSL/TLS is (and isn't), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

Cisco and Standards: Opening the Door to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.
Posted: 01 Dec 2010 | Published: 30 Nov 2010

Cisco Systems, Inc.

Closing the IT Process Automation Gap
sponsored by Opalis Software, Inc.
WHITE PAPER: Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
Posted: 28 Aug 2007 | Published: 01 Aug 2007

Opalis Software, Inc.

Web Threats: Challenges and Solutions
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement