Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
226 - 250 of 1018 Matches Previous Page  |  Next Page
CW Special Report on CA Technologies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

CW+: IDC Report - How to manage documents in the enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: In recent years C-level executives in many of the world's largest and most successful organizations have been forced to introduce a wide range of cost-cutting measures as macroeconomic forces continue to create a challenging and uncertain trading environment.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

dapt Your Endpoint Security to Mobility and Advanced Threats
sponsored by AVG Technologies
EGUIDE: Read this expert guide to learn about the different kinds of endpoint security options available, and to begin creating strong, multi-layered defense for all your endpoints.
Posted: 21 May 2015 | Published: 21 May 2015

AVG Technologies

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Dealing With the Problem of Targeted Email Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn everything you need to know about how targeted email attacks occur, and what you can do to prevent them.
Posted: 21 May 2015 | Published: 30 Jan 2015

Trend Micro

Delivering Data Warehousing as a Cloud Service
sponsored by Snowflake
WHITE PAPER: Access this white paper to learn the benefits of transforming data warehousing into a cloud service. Also, discover the five requirements for delivering data warehousing as a service.
Posted: 13 May 2015 | Published: 31 Oct 2014


Dell and Microsoft: Better Together
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover how Dell and Microsoft have teamed up to offer a desktop virtualization solution that eliminates the obstacles of adoption and delivers a flexible, cost-effective way to deploy desktop virtualization.
Posted: 21 May 2015 | Published: 21 May 2015

Dell, Inc.

Dell PowerEdge R630 Configuration for MS Private Cloud Fast Track
sponsored by Dell and Microsoft
WHITE PAPER: View this solution brief to discover a flexible reference architecture designed for simple, scalable Microsoft Private Cloud deployments.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft

CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Dashboard Software Buyers Guide
sponsored by LogiXML
WHITE PAPER: This paper will guide you through the process of understanding organizational requirements, which will dictate which software is the best fit to meet your needs and accomplish your goals. Based on these organizational requirements, we provide an evaluation checklist to evaluate various solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

LogiXML

Data Leak Protection Planning
sponsored by (ISC)2 UK Ltd
EBOOK: It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.
Posted: 23 Sep 2010 | Published: 23 Sep 2010

(ISC)2 UK Ltd

Data Loss Prevention Survey
sponsored by Symantec Corporation
ASSESSMENT TOOL: Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

Symantec Corporation

Data Protection Solution-Taking Control of Your Data
sponsored by Lumension
WHITE PAPER: Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Posted: 12 Aug 2009 | Published: 30 Oct 2008

Lumension

DataSheet: Rational Quality Manager
sponsored by IBM
DATA SHEET: IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Hexis Cyber Solutions Inc

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software
sponsored by Dell, Inc. and Intel®
CASE STUDY: Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

Dell, Inc. and Intel®

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by Dell, Inc.
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

Dell, Inc.
226 - 250 of 1018 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement