Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Handshake Authentication Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Handshake Authentication Protocol White Papers (View All Report Types)
 
An Overview of Business Process Design
sponsored by TIBCO Software Inc.
WHITE PAPER: This paper, based on a webinar by BPM analyst and blogger Sandy Kemsley, provides an overview of business process design. Topics include BPM standards, BPM and architecture, BPM design patterns and principles, integrating business intelligence and BPM, integrating business rules and BPM
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TIBCO Software Inc.

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

Database Middleware: Struggling with Performance?
sponsored by Progress DataDirect
WHITE PAPER: Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses.
Posted: 03 Feb 2011 | Published: 03 Feb 2011

Progress DataDirect

IPv6 Addressing Plan Basics
sponsored by Infoblox
WHITE PAPER: Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Infoblox
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement