IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Top 10 Security Considerations for the Internet of Things
sponsored by Axway
WHITE PAPER: Access this white paper and discover how IoT is shaping the landscape of application lifecycle management, logic, and data-access chores. In addition, learn 10 top security considerations IoT and how these can impact your software development projects.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Axway

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

Manufacturing Goes Mobile: Highlights in MDM and Application Security
sponsored by IBM
WHITE PAPER: This white paper surveys the use of mobile device management (MDM) in the manufacturing industry. Read on to learn how you can leverage MDM to improve operational efficiency and bottom-line benefits.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

IBM

Defending Against Cloud Security Threats
sponsored by Data#3
WHITE PAPER: This white paper is a comprehensive guide to securing your cloud and virtual infrastructure using Microsoft Azure.
Posted: 16 Jul 2015 | Published: 28 Feb 2015

Data#3

ID and Access Management for Microsoft Applications
sponsored by HID
WHITE PAPER: This white paper outlines how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Read on to learn about how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

HID

Configuring and Deploying Open Source with WebSphere Application Server Liberty Profile
sponsored by IBM
WHITE PAPER: Enterprises are always searching hard for a capable platform for developing and testing web and OSGi applications. This e-book demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

IBM

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. Click here to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement