Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Microsoft IIS

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft IIS Reports
 
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Finding the Right Agile Software for Your Organization
sponsored by CA Technologies
WHITE PAPER: Once considered cutting-edge, Agile development is now becoming a must-have methodology for companies looking to compete in the app economy and combat forces like digital disruption. Uncover4 key considerations for adopting Agile and learn how it accelerates high-quality app development.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

CA Technologies

7 Warning Signs You Need to Replace Your ESB
sponsored by Dell Boomi
EBOOK: Uncover 7 warning signs that your ESB is struggling to keep up with modern integration requirements and learn how to update your integration infrastructures for cloud, mobile, social, big data, and IoT apps.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Dell Boomi

Conventional Test Data Management Challenges (Part 1)
sponsored by Actifio
WEBCAST: Discover how data virtualization improves test data management, enhances your ability to work in the cloud, and creates more cost-effective app development.
Posted: 17 Jul 2017 | Premiered: Jul 17, 2017

Actifio

Hyperconverged Infrastructure E-book
sponsored by Hewlett Packard Enterprise
EBOOK: This 53-page e-book explores the basics of hyperconverged infrastructure implementation. Read on to learn how you can build a hyperconverged infrastructure that delivers efficiency, availability, and data protection across your entire data center and storage ecosystem.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Hewlett Packard Enterprise

Recognizing the 12 Failure Modes in Agile Transformation
sponsored by CA Technologies
EBOOK: From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, find out how to avoid 12 common Agile pitfalls. Learn what it takes to go beyond Agile adoption to achieve Agile transformation so that you can create business agility, facilitate collaboration, and transform leadership for Agile.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

CA Technologies

Bosch Drives Game-Changing Innovation with Massive Flexibility from SAP S/4HANA and IBM POWER8
sponsored by EOH IBM
VIDEO: Watch this brief video to find out how Robert Bosch improved support for their business-critical workloads on SAP apps like S/4HANA and SAP Hybris by updating their infrastructure, virtualization, and server strategies.
Posted: 06 Oct 2017 | Premiered: 25 May 2017

EOH IBM

Evaluating Approaches to Enterprise Mobility
sponsored by Capriza
WHITE PAPER: Explore 4 approaches to satisfying the demand for anywhere, anytime access to mobile-ready apps by an increasingly mobile workforce. Learn how to easily transform traditional apps for mobile and build customized micro apps without any APIs, coding, or integration.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Capriza

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement