Standards  >   Network Protocols  >   TCP/IP  >  

Internet Key Exchange

RSS Feed    Add to Google    Add to My Yahoo!
Internet Key ExchangeReports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

HP Network Automation 9.00 Evaluation
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett-Packard Company

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Connectivity is the Key to Improving Patient Information Exchange
sponsored by Kodak
WHITE PAPER: Discover how direct messaging can help create a smooth patient information exchange and improve workflow efficiency.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Kodak

What Is Ethernet-Dedicated Internet?
sponsored by Cox Communications, Inc.
EGUIDE: This e-guide answers a number of questions about Ethernet DIA, a continuous, high-bandwidth method for enterprises to connect their LANs with the public internet and streamline the performance of their WAN.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cox Communications, Inc.

Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

SearchSecurity.com

How to tackle internet filtering and reporting
sponsored by ComputerWeekly.com
WHITE PAPER: In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

Enabling the Internet of Things For Smarter Environments
sponsored by IBM
WHITE PAPER: Driven by the ongoing rapid growth in low-cost, web-enabled smart sensors and mobile broadband communications, the emerging Internet of Things promises to transform our personal and working lives. But what does it take to truly tap into the potential of the data surrounding the IoT? Read the following white paper to find out more.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

IBM

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
sponsored by SearchSecurity.com
EGUIDE: Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by SearchSecurity.com
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Records Management: The Keys to Success
sponsored by Iron Mountain
EBOOK: With the heightened compliance regulations, your records management has never been more important. Read this e-book to discover: the importance of physical and digital records convergence, why data retention is a cross-departmental concern, new apps designed specifically for e-discovery, and the compliance risks associated with social media.
Posted: 17 Apr 2012 | Published: 17 Apr 2012

Iron Mountain

Mobile messaging is the key to connecting communities
sponsored by ComputerWeekly.com
WHITE PAPER: Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum.
Posted: 25 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Shaspa - Enabling the Internet of Things
sponsored by IBM
WHITE PAPER: This whitepaper examines all the new possibilities and innovations that are now being realized through the use of cloud computing, including in retail and workplace management.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

The Benefits and Challenges of Virtualizing Exchange Server
sponsored by SearchExchange.com
EBOOK: A virtualized Exchange Server can lower an organization's costs, but it's not a simple undertaking.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

SearchExchange.com

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Read this whitepaper to learn 10 steps to help you plan and execute a successful Exchange migration that preserves the user experience, ensures full compliance and business continuity, and ultimately boosts your overall productivity.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Key Considerations for a Converged Infrastructure
sponsored by Bull
EGUIDE: Explore thie e-guide to learn more about how you can optimize your data center with an approach that's designed "with virtualization and cloud in mind."
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Bull

Key Considerations for Colocation Customers
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide compares the cloud, on-premise solutions, and colocation for handling rising data center storage demands.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

CenturyLink Technology Solutions

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Key Considerations for Optimizing Server Virtualization
sponsored by Hewlett-Packard Limited and Intel ®
EGUIDE: This expert e-guide will help you maximize the performance of your virtualized server environment.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Hewlett-Packard Limited and Intel ®

SIP contact centers: Key benefits and potential challenges
sponsored by SearchSecurity.com
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

A Crucial Challenge for the Internet of Everything Era
sponsored by MapR Technologies
WHITE PAPER: Learn about the data engineering challenges brought on by IoE, as well as suggestions for companies to increase their skills and capabilities.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

MapR Technologies

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Change is Constant: Automation for the Internet of Things
sponsored by Automic
WHITE PAPER: How do enterprises make the shift towards a truly agile business model? This whitepaper considers automation as a solution to help enterprises innovate and differentiate in the internet of things.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Automic

Best Practices for Virtualizing and Protecting Exchange Server
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive white paper to uncover the top-notch best practices for using Exchange Server in a virtualized environment.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Veeam Software

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement