Software  >   Malware  >   Spyware  >  

Internet Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Advertising SoftwareReports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Cybercrime: I Spy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This clasroom features expert advice on how to strategically identify and eradicate spyware, as well as the measures CIOs need to take to protect employees' and customers' digital identities.
Posted: 19 Jun 2014 | Premiered: 23 Jun 2014

SearchCIO.com

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

What’s New in VMware® Virtual SAN™
sponsored by VMware, Inc.
WHITE PAPER: The VMware software-defined storage strategy focuses on a set of VMware initiatives regarding local storage, shared storage, and storage and data services.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

VMware, Inc.

Making the Switch
sponsored by CDW Corporation
VIDEO: This video explores how you can work with CDW to figure out what's in your software environment and what type of licenses you have in order to help you build a more strategic approach to your software. View now to learn how you can deliver more benefits from your future agreements.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

CDW Corporation

Want to see JRebel in action? Download your free trial now!
sponsored by ZeroTurnaround
SOFTWARE DOWNLOAD: JRebel is a developer productivity tool that allows Java developers to view code changes instantly. It eliminates the rebuild, restart, redeploy cycle inherent in Java development, which enables developers to get more done in the same amount of time. See for yourself how developers increase team velocity up to 40%!
Posted: 15 Oct 2014 | Premiered: 15 Oct 2014

ZeroTurnaround

Addressing Big Data Storage Needs
sponsored by Red Hat
EGUIDE: In this expert e-guide, examine how software defined storage (SDS) influences data storage infrastructure. Additionally, explore how cloud-based nearline storage has adapted in recent years to meet big data needs as well as advice on how to select public, private or hybrid cloud to meet storage needs.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement