Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Microsoft IIS

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft IIS Reports
 
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Choosing an Enterprise Learning Management System
sponsored by Infor
WHITE PAPER: This paper deals with an additional set of considerations often overlooked when purchasing a learning management system (LMS), focusing on two particular intangibles: post-purchase vendor support and hidden costs. Read on to learn about how to make the best LMS decision for your organization.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Infor

Release Automation and Continuous Delivery for Siebel CRM
sponsored by Automic
WHITE PAPER: This white paper explains how you can achieve release automation and continuous delivery with technology that supports Oracle's Siebel CRM. Find out how to deliver Siebel-specific upgrades with increased agility for a better all-around customer experience.
Posted: 09 Aug 2016 | Published: 31 Oct 2015

Automic

Data Diaries: How VMware Built a Community around Analytics
sponsored by Tableau Software
WHITE PAPER: In order to prevent disarray, businesses need to empower people in an accurate and scalable way. The best way to achieve this is by fostering a culture of self-service analytics. Find out how VMware built a community around data analysis, and ultimately gained access to better visualization and insights.
Posted: 08 Jul 2016 | Published: 16 Oct 2015

Tableau Software

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Competitive Review: 2 Integrated Business Solutions under Scrutiny
sponsored by Red Hat
WHITE PAPER: Access this review on BPM tools to find a side-by-side comparison of two products aimed at helping business leaders and developers find success with business process strategies, and determine which one is right for your organization.
Posted: 05 Apr 2016 | Published: 30 Oct 2015

Red Hat

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Windows 10: A Guide for OS Migration
sponsored by Flexera Software
EGUIDE: Migrating to Windows 10 may seem like a daunting task, especially since there are organizations out there that haven't finished the move from Windows XP to Windows 7. But in this e-guide, we have assembled some useful advice about best practices, planning, and helpful tools to make your clients' OS migrations as simple and pain-free as possible.
Posted: 22 Jul 2016 | Published: 20 Jul 2016

Flexera Software

Does a proprietary solution automatically mean vendor lock-in?
sponsored by ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 14 Mar 2016 | Published: 14 Mar 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement