Application Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Application Protocols Reports
 
Mobile data security ambiguity raises unique governance challenges
sponsored by TechTarget
RESOURCE: The new threat of breaches in today's digital era further complicates governance processes, while compliance rules require innovative methods to track and analyze information. Let independent compliance experts explain how you can adapt inside your free copy of Data Governance in the Digital Age.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

TechTarget

Demystifying Industry Standards: The Key to Simplifying B2B Integration
sponsored by IBM
WHITE PAPER: In this white paper, learn about the role of industry standards within business processes, why complexities exist that prevent organizations from leveraging them, and how successful implementation of industry standards and B2B can synchronize value chains, create efficiencies, and reveal opportunities to deliver value to customers.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

IBM

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Strategic Migration Planning Guide: WebSPHERE to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: This migration planning guide provides a five-step process designed to identify migration opportunities, examine risks, create a standard enterprise environment, and develop a strategic migration plan. Read now for insight into the considerations and processes required to move to an enterprise app platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement