IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
Tips to Ensure Smooth Application Deployment and Performance
sponsored by SERENA Software, Inc.
EGUIDE: In this expert guide, you'll learn how a unified DevOps approach to app development, deployment, and runtime management can avoid these dreaded issues and simplify application lifecycle management as a whole. In addition, you'll uncover 7 helpful tips for improving the deployment process.
Posted: 08 May 2015 | Published: 07 May 2015

SERENA Software, Inc.

The Last Frontier: Optimization: of the Workforce
sponsored by Workday
WEBCAST: More often business users are looking for a means by which to integrate financial, human resources, and talent information into one platform. In this webcast, Leighanne Levensaler, VP of Product Strategy at Workday, speaks about the challenges HR professionals face with legacy human resource systems and how they can become the workforce authority.
Posted: 04 Aug 2015 | Premiered: Aug 4, 2015

Workday

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: In this white paper, discover why it's best to ditch file transfer protocol-based and personal file sync and share tools that increase risk for a data breach. Access now and discover how a managed file transfer approach offers modern, secure data flow transmission.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Axway

The Importance of Secure Application Development Lifecycles
sponsored by White Hat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

White Hat Security

Top 10 Security Considerations for the Internet of Things
sponsored by Axway
WHITE PAPER: Access this white paper and discover how IoT is shaping the landscape of application lifecycle management, logic, and data-access chores. In addition, learn 10 top security considerations IoT and how these can impact your software development projects.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Axway

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about one ADC solution that offers many things, not the least of which is security.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

Citrix

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Test Results for a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement