Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Browsers

RSS Feed    Add to Google    Add to My Yahoo!
Browsers Reports
 
Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Presentation Transcript: SEQUEL: The Triathlete of Data Access
sponsored by SEQUEL-Software
PRESENTATION TRANSCRIPT: This transcript describes  how data access supports System i operations. Discover the key features and functions of a business information tool that caters to 3 System i user needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SEQUEL-Software

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

Sync for Commvault Edge™
sponsored by Commvault
VIDEO: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

Commvault

jQuery on Rails (The Real Ones)
sponsored by The Ajax Experience
PODCAST: The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users.
Posted: 15 Jan 2009 | Premiered: Jan 7, 2009


Handling Mobile Web Pages Better
sponsored by QUALCOMM Incorporated
EBOOK: In this white paper, find out how to get higher performance out of browser and JavaScript™ engines. Discover how to take advantage of Web Technologies optimizations to provide a user experience befitting the Truly Mobile Web.
Posted: 23 Jun 2011 | Published: 23 Jun 2011

QUALCOMM Incorporated

Single Source of Truth: A Guide for Real User Measurement in the Workplace
sponsored by SOASTA, Inc
WHITE PAPER: Inside this valuable resource, discover how, by measuring from the user's browser or app, real user management (RUM) tools can quantify the correlation between page load time and user engagement, and show where to optimize performance for more positive outcomes.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SOASTA, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement