IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowReports
 
Living with open source software
sponsored by Hewlett-Packard Company
VIDEOCAST: This expert webcast highlights the risks of open source code in software projects, and explains why applications are vulnerable to attack from the moment they go live on the internet.
Posted: 07 Oct 2014 | Premiered: Sep 29, 2014

Hewlett-Packard Company

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

Presentation Transcript: Opportunities with VMware and VMware Horizon 6
sponsored by Avnet Technology Solutions
PRESENTATION TRANSCRIPT: This audio cast transcript talks about how VMware can lower overall costs while maintaining clouds for both public and private networks.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Avnet Technology Solutions

Web Application Firewall Comparative Analysis Security Value Map™
sponsored by Fortinet, Inc.
WHITE PAPER: This report for NSS presents a comparative analysis of web application firewalls based on empirical data from in-depth, side-by-side product testing.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Fortinet, Inc.

Deployment Best Practices and Guidelines to Deliver any App to Mobile Users
sponsored by Citrix
WHITE PAPER: Explore this resource to learn best practices and guidelines that can help you deliver any corporate app to your mobile users, and allow you to benefit from this increased productivity that will result. Read on now to learn more.
Posted: 01 Aug 2014 | Published: 31 May 2014

Citrix

One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

Web Application Firewall Product Analysis: Fortinet FortiWeb 1000D
sponsored by Fortinet, Inc.
WHITE PAPER: So just how effective is the FortiWeb 1000D at accomplishing this? This report from NSS labs provides a comprehensive analysis of the security effectiveness, performance and total costs of this web application firewall offering.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement