Interactive Entertainment Games White Papers

(View All Report Types)
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

How to Unlock the Promise of Agile in the Enterprise
sponsored by Workfront
WHITE PAPER: This in-depth white paper discusses Agile, and how it can be implemented on a large scale. Read on to find out what benefits one can expect from enterprise-wide Agile implementation, and what challenges await.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

Workfront

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

The good, the bad, and the ugly of cloud applications
sponsored by Oracle Corporation
WHITE PAPER: This comprehensive research study explores the good, the bad, and the ugly of cloud applications, and describes how midsize organizations are using the cloud.
Posted: 28 Mar 2014 | Published: 30 Sep 2013

Oracle Corporation

Use Analytics to Innovate and Lead in Today's Banking Environment
sponsored by IBM
WHITE PAPER: Banks are bringing together big data projects, transactional processing, data warehousing and analytic tooling. Find out how IBM DB2 for z/OS and DB2 Analytics Accelerator in an IBM zEnterprise environment can help.
Posted: 22 Apr 2014 | Published: 31 Mar 2014

IBM

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Best Practices for Open Source and the Cloud
sponsored by Red Hat
WHITE PAPER: This whitepaper takes a careful look at two of today's most popular topics: open source application software and moving to the cloud.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

Red Hat

Use Service Virtualization to remove testing bottlenecks
sponsored by IBM
WHITE PAPER: Learn how to overcome today's test and development roadblocks with Service Virtualization.
Posted: 16 May 2013 | Published: 16 May 2013

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM