Software  >   Malware  >   Spyware  >  

Internet Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Advertising SoftwareWhite Papers (View All Report Types)
 
Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Eight Ways Better Software Deployment and Management Can Save You Money
sponsored by Dell, Inc.
WHITE PAPER: This resource counts down eight critical benefits you can achieve by learning to effectively manage the software deployment lifecycle. Also inside, find key recommendations to help you get started.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

A New Security Approach for Today's Advanced Attacks
sponsored by FireEye
WHITE PAPER: This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

FireEye

Poison Ivy: Assessing Damage and Extracting Intelligence
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CDW Corporation
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 03 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Deploying Red Hat Enterprise Virtualization on HP Converged System 700x
sponsored by HP and Intel
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HP and Intel

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement