Software  >   Systems Software  >   Server Software  >   Web Server Software  >  

Microsoft Internet Information Services

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft Internet Information Services Reports
How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Server value solved: Why it all comes down to systems management
sponsored by Lenovo
WHITE PAPER: In the following white paper, learn about Lenovo's XClarity Systems Management solution and discover how its flexibility to adopt and adapt to evolving data center technologies makes it a great choice in handling all your systems management needs. Access now and learn what separates these systems from others in the field.
Posted: 16 Oct 2015 | Published: 16 Oct 2015


Modern-Day SDN Gets an Interoperability Facelift
sponsored by Citrix
WHITE PAPER: Existing architectures have proven inadequate for rapid deployment of applications. As interoperability grows among vendors, Software Defined Networking (SDN) is moving beyond the purely theoretical. This white paper advises you on implementing more efficient and effective approaches to application server load balancing.
Posted: 31 Jul 2015 | Published: 31 Jan 2015


Backup & Data Protection Buyer's Guide: What You Need to Know
sponsored by Unitrends
ESSENTIAL GUIDE: Access this essential guide to examine what you need to know about backup and data protection. You'll learn about the benefits and drawbacks of software-managed, hardware-managed, and cloud-managed backup strategies as well as the differences between array- and host-based replication.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Ecommerce & Media Websites: A Custom Private Cloud to Handle Your Complex Website Requirements
sponsored by Rackspace
WHITE PAPER: E-commerce and media-rich websites require robust infrastructure, security, compliance, and high availability. A custom private cloud can handle these complex websites. Read this white paper to find out how to support the needs of these websites.
Posted: 05 Jun 2015 | Published: 18 May 2015


End-to-end data center solutions
sponsored by Lenovo and Intel
WHITE PAPER: Data is getting bigger, expectations are rising, and the data center is key to getting and staying ahead of these challenges. Luckily, IT decision-makers now have a better option for building a robust, resilient IT infrastructure. Find out what it is in the following white paper.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Lenovo and Intel

DevOps For Dummies - New Edition with SAFe
sponsored by IBM
WHITE PAPER: In this "DevOps for Dummies" guide, get an introduction to DevOps from a holistic business perspective. Also learn about key DevOps topics, including principles and best practices, four paths to DevOps adoption, and more.
Posted: 17 Nov 2015 | Published: 31 Dec 2014


Bend Down the Cost Curve of IT
sponsored by Lenovo and Intel
WHITE PAPER: Access this white paper to see for yourself how Lenovo System x and ThinkServer, powered by Intel® Xeon® processors, can help you do more with less while providing maximum up-time at a low cost.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Lenovo and Intel

Driving Product Quality With Continuous Verification and Validation
sponsored by IBM
WHITE PAPER: Access this informative white paper to learn more about how continuous verification and validation strategies can help quality teams keep up with agile development. Read on to learn about eth methods and approaches that can enable continuous verification and validation and determine the right strategy for your organization.
Posted: 19 Mar 2015 | Published: 14 Oct 2014


The Merry-Go-Round of Security Testing
sponsored by
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement