Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Cybercrime: I Spy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This clasroom features expert advice on how to strategically identify and eradicate spyware, as well as the measures CIOs need to take to protect employees' and customers' digital identities.
Posted: 19 Jun 2014 | Premiered: 23 Jun 2014

SearchCIO.com

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Istanbul Kultur University: Ready for the Future
sponsored by Hewlett-Packard Limited
CASE STUDY: Check out this case study that profiles one university in particular that needed to replace an ageing network infrastructure to accommodate high-performance wireless solutions.
Posted: 22 Jan 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited

How new F&A Solutions Can Help CFOs Improve Forecasting Performance
sponsored by Anaplan
WHITE PAPER: Access this white paper to find out how new FP&A software can help CFOs improve forecasting performance and provide universal access through mobile devices and increasingly powerful analytics while lowering the entry barriers to software deployment.
Posted: 13 Jan 2015 | Published: 31 May 2014

Anaplan

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

The Quality Challenges Associated with Implementing Agile and Scrum
sponsored by nfocus
WHITE PAPER: This white paper takes a closer look at these issues and explains how they can be resolved leading to delivering software at the appropriate quality level.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

nfocus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement