Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Microsoft IIS

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft IISReports
 
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Full Software Contract Negotiation and Support
sponsored by CDW Corporation
VIDEO: This video explores how the professionals at CDW can walk you through the software management lifecycle. View now to learn how partnering with CDW can help you with every step along the way.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

CDW Corporation

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

SDN meets the real-world: implementation benefits and challenges
sponsored by Nuage Networks
WHITE PAPER: From little more than a research project a decade or so ago, SDN has become one of the biggest trends in the data center, and for good reason.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Nuage Networks

Dell OpenManage on 13g Dell PowerEdge Servers: Simplifying Your Systems Management
sponsored by Dell, Inc.
WHITE PAPER: The OpenManage suite within the new 13G Dell PowerEdge servers cut 213 steps from the process of updating a single server which gives your administrators time to make other improvements.
Posted: 21 Oct 2014 | Published: 31 Aug 2014

Dell, Inc.

The Current and Future Benefits of SDN in the Campus
sponsored by Brocade
WHITE PAPER: This white paper dives deep into a number of alternative network virtualization options that are available today. Learn about SDN campus use cases, and additionally how implementing network virtualization can yield immediate benefits.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

Brocade

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

What You Need to Know About HP 5400R z12 Switch Series
sponsored by Hewlett-Packard Company
DATA SHEET: Uncover the specifics on an advanced, intelligent switch technology – HP 5400R z12 Switch Series.
Posted: 10 Sep 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

Build more robust native mobile applications with IBM the MobileFirst Platform
sponsored by IBM
WHITE PAPER: Learn how IBM MobileFirst Platform Foundation can securely enable mobile application development, delivery and management.
Posted: 15 Sep 2014 | Published: 30 Jun 2014

IBM

Integrated OpenStack Cloud Solution with Service Assurance
sponsored by Intel
WHITE PAPER: Find out which hardware and software solutions can enable the private cloud to run all workloads.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement