IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Embracing Strategic Mobility for Small to Midsize Businesses
sponsored by Cisco
WHITE PAPER: In this white paper, Nolan Greene, research analyst with IDC's Network Infrastructure group, breaks down the concerns with regards to adopting mobility in small to midsize businesses. Learn how to best adapt your SMB to current mobile trends.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Mobilize Your Enterprise Applications without the Hassle of Upgrading
sponsored by StarMobile
WHITE PAPER: In this white paper, you will discover how to transform your enterprise applications without costly upgrades and for use on any endpoint. Learn how to mobilize your legacy apps at a fast, simple, and economic pace, and without modifying them at the source code level.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


The Guide to Successful Mac Mobile Deployments in Your Enterprise
sponsored by JAMF Software
WHITE PAPER: This expert guide highlights five important steps needed to successfully deploy Mac computers in your organization, utilizing user-friendly deployment programs.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

JAMF Software

Top 5 Cloud Data Protection Challenges. Solved
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 28 Sep 2015 | Published: 24 Aug 2015


The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015


Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Web Application Firewall: Protect the Perimeter
sponsored by Akamai
WHITE PAPER: In this white paper, learn how web application firewalls (WAFs) bolster network perimeter security to stop threats before the infiltrate the enterprise.
Posted: 18 Nov 2015 | Published: 18 Jun 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement