Business of Information Technology  >   Business Management  >   Best Practices  >  

Best Practices Technology information

RSS Feed    Add to Google    Add to My Yahoo!
Best Practices Technology information Reports
 
Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

A Holistic Approach to Data Privacy
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: This white paper makes a case for a holistic approach to privacy within every enterprise, and explains the steps that your enterprise needs to take in order to maximize the privacy of your sensitive data.
Posted: 16 Jan 2015 | Published: 30 Sep 2013

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Generate ROI with IT and Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how businesses are rethinking the IT infrastructure. Gain insights into strategies that significantly reduce costs and complexity of new initiatives by leveraging Business Intelligence (BI) platforms with IT expertise.
Posted: 08 Apr 2015 | Published: 30 Apr 2012

Information Builders

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

On the Front Lines: How IT Can Manage Real-Time Risks
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn the basics of managing risk in your enterprise. While a challenge, this resource explains why analytics and data management consultants are your main line of defense that allow you to detect threats.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Data-driven enterprise infrastructure
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: Access this white paper to learn how big data is enabling IT to cater to customer and business needs. Discover why the right infrastructure is essential to harnessing the power of big data to build your brand to the fullest potential. Assess your business' infrastructure and your readiness to harness the power of big data now.
Posted: 23 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Limited and Intel ®

Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.
Posted: 23 Mar 2015 | Published: 20 Mar 2015

ComputerWeekly.com

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement