Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Web Services (Software)

RSS Feed    Add to Google    Add to My Yahoo!
Web Services (Software) White Papers (View All Report Types)
 
Web-facing applications: Security assessment tools and strategies
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

SearchSecurity.com

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

How to Migrate CORBA Applications to Web Services
sponsored by Rogue Wave Software
WHITE PAPER: This white paper discusses the steps necessary for migrating CORBA applications to Web services. Learn how to evolve existing applications without sacrificing business logic.
Posted: 21 Jul 2008 | Published: 01 Jul 2008

Rogue Wave Software

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

IntraLinks, Inc

Mobilizing Applications Lotus Domino Databases
sponsored by BlackBerry
WHITE PAPER: The ability to access and update Lotus Domino applications can be a simple and effective way to improve efficiency. Read this paper and learn how easy it can be to create BlackBerry applications that integrate with your Lotus Domino applications.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

Scale Operations and Boost Service Levels While Keeping Cost and Growth In Mind
sponsored by CA Technologies.
WHITE PAPER: This case study tells the story of one organization's partnership with a service provider that delivers significant improvements in performance and availability while also efficiently managing costs and business growth.
Posted: 05 Jun 2014 | Published: 30 Apr 2014

CA Technologies.

Web 2.0 in Action! How SAP Is Leveraging Web 2.0 in CRM to Improve Customer Experience
sponsored by SAP America, Inc.
WHITE PAPER: This paper discusses how SAP leverages Web 2.0 in CRM to improve customer experience. It examines SAP’s approach to Web 2.0, and how SAP has incorporated the Web 2.0 technological principles within SAP CRM.
Posted: 30 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

End user response shouldn't be optional
sponsored by CA Technologies
WHITE PAPER: What is it that organizations are missing when trying to pinpoint network issues? Find out more in this resourceful white paper that unveils the importance of end user response monitoring.
Posted: 30 Sep 2013 | Published: 30 Sep 2012

CA Technologies

Are You Securely Delivering Enterprise Data and Services?
sponsored by Webroot
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement