Specifications

RSS Feed    Add to Google    Add to My Yahoo!
Specifications Reports
 
The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement