Standards  >   Network Protocols  >   TCP/IP  >  

IKE (Internet Key Exchange)

RSS Feed    Add to Google    Add to My Yahoo!
IKE (Internet Key Exchange) Reports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Changes in Financial Management Systems and Regulations
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014

Workday

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

Database Middleware: Struggling with Performance?
sponsored by Progress DataDirect
WHITE PAPER: Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses.
Posted: 03 Feb 2011 | Published: 03 Feb 2011

Progress DataDirect

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

HP Network Automation 9.00 Evaluation
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett-Packard Company

Dimension Data Helps Purdue Pharma Deploy and Manage Unified Communications to Support Corporate Growth
sponsored by Dimension Data
CASE STUDY: Read this case study to learn how Dimension Data’s managed services helped a pharmaceutical company replace a legacy phone system with a converged communications solution.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

Dimension Data

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by SearchSecurity.com
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

SearchSecurity.com

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

The 11th Annual Storage magazine Products of the Year Awards
sponsored by SearchStorage.com
EZINE: In the February 2014 issue of Storage magazine, we reveal the winners of our 2013 Products of the Year awards, explore 10 disaster recovery don'ts and much more!
Posted: 13 Feb 2014 | Published: 13 Feb 2014

SearchStorage.com

Guide: Migrating from Windows XP to Windows 7
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.
Posted: 16 Jul 2012 | Published: 05 Nov 2011

ComputerWeekly.com

Computer Weekly: Nato and business join forces to tackle cyber security threats
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how Nato wants to work with businesses to tackle their common cyber security threat. Is Amazon becoming the new Microsoft? We examine the historic similarities between the two suppliers. And airline easyJet talks about putting hybrid cloud into action. Read the issue now.
Posted: 22 Sep 2014 | Published: 23 Sep 2014

ComputerWeekly.com

Smart Ops: Reaping the Full Benefits of the Cloud
sponsored by VMware
WHITE PAPER: This essential whitepaper takes a look at the rise of operations management, a method for achieving unified visibility with high levels of automation and embedded predictive analytics.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

VMware

Business Information ANZ January 2015
sponsored by SearchBusinessAnalytics
EZINE: Australia's workforce-management industry has rapidly shifted to embrace all manner of online innovation to allow firms to find, recruit, and train key staff from anywhere in Australia (and out of it).
Posted: 05 Jan 2015 | Published: 05 Jan 2015

SearchBusinessAnalytics

Sophos Mobile Security Threat Report
sponsored by Sophos, Inc.
WHITE PAPER: This mobile security threat report answers these questions, as it pinpoints what to expect in the near future with regard to mobile malware. Continue on to find 10 tips to secure your mobile users and prevent mobile malware infections on company or BYOD devices.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Sophos, Inc.

NSA Series data sheet
sponsored by Dell Software
WHITE PAPER: Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.
Posted: 23 Aug 2013 | Published: 30 Jun 2013

Dell Software

Policy Reference Guide: Blackberry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

Getting Ready for BlackBerry Enterprise Service 10.2
sponsored by BlackBerry
WEBCAST: This exclusive video examines how your organization can get your system ready for one of the latest mobile management tools, detailing what steps you can take to ensure that your transition is seamless, simple and pain-free.
Posted: 11 Dec 2013 | Premiered: Dec 11, 2013

BlackBerry

Oracle Solaris 10 Networking
sponsored by Oracle Corporation UK Ltd
DATA SHEET: Accelerating trends are driving the evolution of networking in the Oracle Solaris operating system (OS). Millions of new users connect to the internet every week through increasingly sophisticated wireless devices, PCs, and even automobiles. Networking features in Oracle Solaris 10 address performance, scalability, security, and protocol support.
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Oracle Corporation UK Ltd

Consolidating Applications with Oracle Solaris Containers
sponsored by Oracle Corporation
WHITE PAPER: Oracle Solaris Containers implement OS virtualization using containers that are designed to provide a complete, isolated, secure runtime environment for applications—and in situations where resources can be managed with sub-CPU granularity.
Posted: 14 Mar 2011 | Published: 03 May 2010

Oracle Corporation

Consolidating Applications with Oracle Solaris Containers
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: The goal of this white paper is to provide information about consolidating applications onto a single server using Oracle Solaris Containers to isolate applications and efficiently manage system resources between them.
Posted: 26 Aug 2010 | Published: 01 May 2010

Oracle Corporation UK Ltd

Top 10 Actions a CIO Can Take to Prepare for a Hurricane
sponsored by Dell India
WHITE PAPER: There are ten key actions that your company and CIO can take as this hurricane season approaches to help your business achieve communications continuity and business continuity to protect against the unpredictability and devastation that is a hurricane. Read this white paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2008

Dell India

Computer Weekly - 13 December 2011: Read this week’s special issue announcing the UKtech50 – the 50 most influential people in UK IT.
sponsored by ComputerWeekly.com
EZINE: In this week's special issue of Computer Weekly, we reveal the UKtech50 - our list of the 50 most influential people in UK IT. This year's winner is Mike Lynch, CEO of Autonomy, who talks in an exclusive interview about his hopes for the UK technology industry, and life at HP since the company's 7bn GBP acquisition. Download the new issue now.
Posted: 12 Dec 2011 | Published: 09 Dec 2011

ComputerWeekly.com

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
Posted: 07 Nov 2011 | Published: 04 Nov 2011

ComputerWeekly.com

Architecting a vCloud
sponsored by VMware, Inc.
WHITE PAPER: If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Digital Certificates and the Apache Web Server
sponsored by Thawte Inc.
WHITE PAPER: This guide offers support on how to test, purchase, install, and use digital certificates for SSL connections on your Apache web server. View now to learn more.
Posted: 07 May 2013 | Published: 07 May 2013

Thawte Inc.

Log Management E-book
sponsored by RSA
EBOOK: Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement