Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Internet Information Server

RSS Feed    Add to Google    Add to My Yahoo!
Internet Information Server Reports
 
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Essential Guide to Mobile App Testing
sponsored by Applause
EBOOK: Discover how to improve testing throughout the mobile app lifecycle to mitigate a variety of issues, from functionality and usability to security and OS fragmentation.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Applause

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

The Top 6 Microservices Patterns
sponsored by MuleSoft
WHITE PAPER: Learn about the 6 microservices patterns available to make adoption an easier task for your organization so that you can help the architecture underlying your development initiatives evolve.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

MuleSoft

The DCIM Tool and Its Place in the Modern Data Center
sponsored by RunSmart
EGUIDE: Because there is a learning curve with DCIM tools, buyers must first consider why their organizations might need them and examine their features. Download now to see the role DCIM tools play in disaster prevention preparation, asset management, monitoring and managing energy costs, and more.
Posted: 11 Dec 2017 | Published: 05 Dec 2017

RunSmart

Driving Digital Transformation by Democratizing App Development
sponsored by PowWow
WEBCAST: Find out what it truly means to digitally transform for mobile, and learn about the democratization of mobile app development with low-code tools.
Posted: 18 Dec 2017 | Premiered: Dec 18, 2017

PowWow

Best Practices for Migrating to Containerized Applications
sponsored by Red Hat
EBOOK: Most applications can be containerized, but you need a comprehensive plan before beginning the process. This e-book outlines technical recommendations and best practices for migrating software into containers, ranging from image build procedures to how they should run in production.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

Red Hat

Involve Your Customers in Self-Service CRM Applications
sponsored by K2
VIDEO: In this webcast, find out how to create self-service CRM apps, facilitate data integration, customize customer portals, and more without having to write any code.
Posted: 03 Jan 2018 | Premiered: 02 Jan 2018

K2

How Enterprise Release Management Enables Digital Business Transformation
sponsored by Plutora
WHITE PAPER: Find out how proper enterprise release management helps you manage digital transformation more effectively and discover how to accelerate quality software delivery.
Posted: 11 Jan 2018 | Published: 11 Jan 2018


How Flex is Scaling their Mobile App Portfolio with PowWow Mobile
sponsored by PowWow
WEBCAST: In this brief video case study, Flex's IT Director, Myckel Haghnazari, explains how they selected an app development platform that enabled them to modernize legacy apps for mobile devices and OS, incorporate citizen developers, unify user experiences across their app portfolio, and more.
Posted: 19 Dec 2017 | Premiered: Dec 19, 2017

PowWow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement