Standards  >   Internet Standards  >   Web Protocols  >  

Hypertext Transfer Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Hypertext Transfer Protocol Reports
 
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

Forrester Report: Put Web Images On A Diet To Improve Customer Experience
sponsored by Akamai
RESOURCE: Rich media are keeping web performance from improving despite rising web standards and improved browsers. This Forrester report investigates the performance benefits of the new web protocol HTTP/2. Find out how slimming down images improves customer experiences, and learn how to stop rich media from drowning your digital experiences.
Posted: 10 Aug 2016 | Published: 27 Oct 2015

Akamai

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE: An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009

Mentor Graphics

The Lucky 7 System i Resources
sponsored by Help/Systems
WHITE PAPER: Robot/CONSOLE©, the System i™ message management and resource monitoring software, can make you and your critical IBM i resources very lucky. With automatic resource monitoring, proactive checking keeps resources running and helps them avoid the unlucky Service Level Agreement (SLA) meeting.
Posted: 03 May 2010 | Published: 03 May 2010

Help/Systems

Introduction to MTOM: A Hands-on Approach
sponsored by Crosscheck Networks
WHITE PAPER: This white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.
Posted: 03 Jan 2008 | Published: 21 Dec 2007

Crosscheck Networks

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Proper use of VPN and RPC/HTTPS
sponsored by F5 Networks
EGUIDE: Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

F5 Networks

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL

The F5 Acceleration Portfolio
sponsored by F5 Networks
WHITE PAPER: F5 is the leader in Application Delivery Networking, ensuring applications are secure, fast, and available. This white paper provides an overview of specific F5 acceleration features across three F5 product lines.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement