Software  >   Applications Software  >   Internet Applications Software  >  

WWW Software

RSS Feed    Add to Google    Add to My Yahoo!
WWW Software White Papers (View All Report Types)
 
The truth about software quality - a global benchmarking study
sponsored by ComputerWeekly.com
WHITE PAPER: This is the first in an annual series of reports highlighting trends in the structural quality of business applications regarding characteristics such as robustness, performance, securit y, and changeability.
Posted: 21 Oct 2011 | Published: 15 Dec 2010

ComputerWeekly.com

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys

SDL Tridion Technical White Paper
sponsored by SDL Web Content Management Solutions Division
WHITE PAPER: This white paper describes how SDL Tridion architecture and technological choices help organizations achieve their business goals. This paper describes technology options for website deployment, SDL Tridion in an enterprise enviorment, and the main components of SDL architecture.
Posted: 19 Apr 2011 | Published: 19 Apr 2011

SDL Web Content Management Solutions Division

Benefits of Citrix NetScaler for Ajax Applications
sponsored by Citrix
WHITE PAPER: In this whitepaper learn the many benefits of Citrix NetScaler for Ajax applications. Discover how NetScaler speeds up the initial load of an Ajax application and helps ensure that the benefits of asynchronous communication are not delayed.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

5 Styles of Business Intelligence
sponsored by MicroStrategy Incorporated
WHITE PAPER: This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.
Posted: 09 Jun 2008 | Published: 01 Jan 2002

MicroStrategy Incorporated

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

Integrating Java EE applications and C-based implementations in WebSphere Application Server
sponsored by IBM
WHITE PAPER: This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.
Posted: 25 Apr 2012 | Published: 14 Mar 2012

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Critical Success Factors Deploying Pervasive BI
sponsored by MicroStrategy Incorporated
WHITE PAPER: Pervasive BI is the ability to deliver integrated right-time DW information to all users - it also provides an enterprise with the necessary visibility, insight, and facts to make smarter decisions in all processes at all times.
Posted: 09 Jun 2008 | Published: 01 Sep 2007

MicroStrategy Incorporated

Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER: The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010

M86 Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement