IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowReports
 
Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Mutual Fund Giant Securely Encrypts Multiple Customer Applications in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features a Boston-based investment services company, and reveals how they made the switch to cloud applications successfully.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Creating A Foundation for Next-Gen Datacenter Security
sponsored by Citrix
WHITE PAPER: This white paper highlights an ADC that is best suited for building enterprise cloud networks.
Posted: 18 Nov 2014 | Published: 30 Sep 2012

Citrix

Selecting an Application Performance Management To Fit Your Business Needs
sponsored by IBM
WHITE PAPER: Check out this resource to access a Decision Matrix on APM for 2014-2015, which reveals 10 of the leading APM solutions in the market.
Posted: 10 Nov 2014 | Published: 18 Feb 2014

IBM

How to Enhance End-User Productivity with a Unified Workspace solution
sponsored by NComputing
WHITE PAPER: This exclusive whitepaper examines how a unified workspace solution can help you seamlessly deliver hybrid apps and critical data to all of your end-users no matter the device they are using.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NComputing

Simple, Efficient, Flexible Data Protection for EMC VSPEX Proven Infrastructure
sponsored by EMC & Arrow
WHITE PAPER: This white paper discusses the data protection considerations that enterprises currently face and introduces EMC's innovative data protection technologies for VSPEX Proven Infrastructures.
Posted: 24 Nov 2014 | Published: 27 Nov 2013

EMC & Arrow

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 01 Dec 2014 | Premiered: 02 Dec 2014

SearchSecurity.com

Defend Against Injection-Based Attacks
sponsored by Rogue Wave Software
WHITE PAPER: In this informative paper, discover some of the most common security vulnerabilities currently plaguing the software development industry, and learn how static code analysis (SCA) can detect them.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Rogue Wave Software

Magic Quadrant for Application Security Testing
sponsored by Veracode, Inc.
ANALYST REPORT: Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement