Standards  >   Internet Standards  >   Web Protocols  >  

Hypertext Transfer Protocol over Secure Socket Layer

RSS Feed    Add to Google    Add to My Yahoo!
Hypertext Transfer Protocol over Secure Socket LayerReports
 
How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Proper use of VPN and RPC/HTTPS
sponsored by F5 Networks
EGUIDE: Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

F5 Networks

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Niksun NetDetectorLIVE Data Sheet
sponsored by NIKSUN
HARDWARE LISTING: NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks.
Posted: 30 Jan 2008 | Published: 01 Jan 2005

NIKSUN

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement