IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hacking

RSS Feed    Add to Google    Add to My Yahoo!
Ethical Hacking Reports
 
Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

Mail Security for Microsoft Exchange Server
sponsored by ESET
DATA SHEET: ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement