Standards  >   Network Protocols  >   TCP/IP  >  

Internet Key Exchange

RSS Feed    Add to Google    Add to My Yahoo!
Internet Key ExchangeWhite Papers (View All Report Types)
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

PACs for Industrial Control, the Future of Control
sponsored by National Instruments
WHITE PAPER: This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

IMS Ready and Raring to Go: A New World of Voice, Video, and Data
sponsored by F5 Networks
WHITE PAPER: The beliefs that IMS architecture is nearly identical to SOA within the enterprise application development market are not without merit. Read this paper to learn the key differences.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Connectivity is the Key to Improving Patient Information Exchange
sponsored by Kodak
WHITE PAPER: Discover how direct messaging can help create a smooth patient information exchange and improve workflow efficiency.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Kodak

What Is Ethernet-Dedicated Internet?
sponsored by Cox Communications, Inc.
EGUIDE: This e-guide answers a number of questions about Ethernet DIA, a continuous, high-bandwidth method for enterprises to connect their LANs with the public internet and streamline the performance of their WAN.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cox Communications, Inc.

Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

SearchSecurity.com

How to tackle internet filtering and reporting
sponsored by ComputerWeekly.com
WHITE PAPER: In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

Enabling the Internet of Things For Smarter Environments
sponsored by IBM
WHITE PAPER: Driven by the ongoing rapid growth in low-cost, web-enabled smart sensors and mobile broadband communications, the emerging Internet of Things promises to transform our personal and working lives. But what does it take to truly tap into the potential of the data surrounding the IoT? Read the following white paper to find out more.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

IBM

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
sponsored by SearchSecurity.com
EGUIDE: Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by SearchSecurity.com
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Records Management: The Keys to Success
sponsored by Iron Mountain
EBOOK: With the heightened compliance regulations, your records management has never been more important. Read this e-book to discover: the importance of physical and digital records convergence, why data retention is a cross-departmental concern, new apps designed specifically for e-discovery, and the compliance risks associated with social media.
Posted: 17 Apr 2012 | Published: 17 Apr 2012

Iron Mountain

Mobile messaging is the key to connecting communities
sponsored by ComputerWeekly.com
WHITE PAPER: Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum.
Posted: 25 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

The Benefits and Challenges of Virtualizing Exchange Server
sponsored by SearchExchange.com
EBOOK: A virtualized Exchange Server can lower an organization's costs, but it's not a simple undertaking.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

SearchExchange.com

Shaspa - Enabling the Internet of Things
sponsored by IBM
WHITE PAPER: This whitepaper examines all the new possibilities and innovations that are now being realized through the use of cloud computing, including in retail and workplace management.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Read this whitepaper to learn 10 steps to help you plan and execute a successful Exchange migration that preserves the user experience, ensures full compliance and business continuity, and ultimately boosts your overall productivity.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Key Considerations for a Converged Infrastructure
sponsored by Bull
EGUIDE: Explore thie e-guide to learn more about how you can optimize your data center with an approach that's designed "with virtualization and cloud in mind."
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Bull

Key Considerations for Colocation Customers
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide compares the cloud, on-premise solutions, and colocation for handling rising data center storage demands.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

CenturyLink Technology Solutions

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Key Considerations for Optimizing Server Virtualization
sponsored by Hewlett-Packard Limited and Intel ®
EGUIDE: This expert e-guide will help you maximize the performance of your virtualized server environment.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Hewlett-Packard Limited and Intel ®

SIP contact centers: Key benefits and potential challenges
sponsored by SearchSecurity.com
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

A Crucial Challenge for the Internet of Everything Era
sponsored by MapR Technologies
WHITE PAPER: Learn about the data engineering challenges brought on by IoE, as well as suggestions for companies to increase their skills and capabilities.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

MapR Technologies

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Change is Constant: Automation for the Internet of Things
sponsored by Automic
WHITE PAPER: How do enterprises make the shift towards a truly agile business model? This whitepaper considers automation as a solution to help enterprises innovate and differentiate in the internet of things.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Automic

Best Practices for Virtualizing and Protecting Exchange Server
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive white paper to uncover the top-notch best practices for using Exchange Server in a virtualized environment.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Veeam Software

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement