Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Microsoft IIS

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft IIS Reports
 
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Computer Weekly: The IT Decisions Behind One of the UK's Largest Construction Projects
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

3 Ways to Move Application Development to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: There are ways to modernize development approaches without squeezing what's left of resources. Explore ways to accelerate innovation, avoid complexity, and increase developer productivity with cloud-based development tools.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Oracle Corporation

Dell Quick Start Tool for Citrix XenDesktop
sponsored by Dell, Inc. and Intel®
WEBCAST: In this webcast, learn about a tool designed to allow an entire Citrix XenDesktop or XenApp platform to be deployed all from one console. Watch now to see a demonstration of how simple and fast it is to set up your desktop or application environment – in just four steps.
Posted: 21 Sep 2015 | Premiered: Aug 4, 2015

Dell, Inc. and Intel®

Driving Innovation with Platform-As-A-Service
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn how cloud infrastructure, DevOps, microservices, and containers can all be brought together using platform-as-a-service (PaaS) technology. See how a PaaS can provide benefits that include developer agility, operational efficiency, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

Red Hat

Fully Automated ETL Testing: A Step-by-Step Guide
sponsored by CA Technologies.
WHITE PAPER: This white paper describes the challenges encountered in a typical approach to ETL testing, including complexity, poor documentation, manual derivations of test cases, and more. Learn about an alternative, broadly model-based approach that can make ETL testing more efficient, effective, and systematic.
Posted: 20 Jan 2016 | Published: 30 Sep 2015

CA Technologies.

The Business Value of one Open Source Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: One research firm interviewed four organizations leveraging a Java-based enterprise application platform to standardize and improve their app development efforts. Discover what these companies experienced as they tested this tool.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Red Hat

Computer Weekly – 12 May 2015: Augmented reality comes to corporate IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopter Zurich Insurance about how augmented reality apps can become part of the corporate IT landscape. We look at Microsoft's Nano Server – the cut-down version of Windows Server designed for the cloud. And we assess the implications of the Nokia acquisition of Alcatel-Lucent. Read the issue now.
Posted: 08 May 2015 | Published: 08 May 2015

ComputerWeekly.com

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement