Standards  >   Network Protocols  >   TCP/IP  >  

UDP Port 500

RSS Feed    Add to Google    Add to My Yahoo!
UDP Port 500 Reports
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

An Overview of Business Process Design
sponsored by TIBCO Software Inc.
WHITE PAPER: This paper, based on a webinar by BPM analyst and blogger Sandy Kemsley, provides an overview of business process design. Topics include BPM standards, BPM and architecture, BPM design patterns and principles, integrating business intelligence and BPM, integrating business rules and BPM
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TIBCO Software Inc.

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager
sponsored by AvePoint, Inc.
WHITE PAPER: This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.
Posted: 10 Jun 2009 | Published: 01 Jun 2009

AvePoint, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Cisco Desktop Virtualization Solutions for EMC VSPEX with VMware View 5.1.2 for 500 Desktops
sponsored by Cisco Systems, Inc.
WHITE PAPER: This document evaluates the scalability of a VMware View 5.1.2 environment, utilizing View Linked Clones, on managed Cisco UCS C-Series C220 M3 Rack-Mount Servers running VMware ESXi 5.1 hypervisor software connected to an EMC VNX5300 Storage Array.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Cisco Systems, Inc.

CW+: Mobile Games: App store strategies, business models and forecasts
sponsored by ComputerWeekly.com
WHITE PAPER: The last two years have been, without a doubt a renaissance era, in mobile games. Driven by the iconic iPhone and its complementing App Store, developers great and small are reaping the rewards of heightened interest in the platform.
Posted: 21 Oct 2011 | Published: 05 Feb 2011

ComputerWeekly.com

Unix-to-Linux Migration
sponsored by SearchDataCenter.com
EGUIDE: Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

SearchDataCenter.com

Agile Network Management: Boost Productivity with Automation
sponsored by Efficientip
WHITE PAPER: This exclusive white paper reveals how one solution can automate network administration tasks, saving your company money and allowing IT professionals to spend more time on bigger issues. Read more to learn how you can boost security, accountability, compliance and productivity with one simple solution.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

Efficientip

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Network security is being redefined to better block data raiders
sponsored by ComputerWeekly.com
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Trends Reshaping Wireless Networking
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchNetworking.com

Application Usage and Threat Report
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper offers a look at key findings with common sharing applications and why they are mostly used by hackers as a delivery system for cybercrime and theft. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Palo Alto Networks

VPN WAN Design Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper examines a VPN solution that can help your organization securely communicate between remote site locations over the internet. Read on to learn implementation tips, best practices, and more.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Cisco Systems, Inc.

A Detailed Report on a Strong and Effective Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the detail you need on a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

One Great Firewall Analyzed in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the information you need about a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Check the network before moving to the cloud
sponsored by SearchSecurity.com
EGUIDE: Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

SearchSecurity.com

Technical Brief: Wireless Access Points
sponsored by Xirrus
WHITE PAPER: This exclusive technical brief features an array of wireless access points that have helped optimize exists WANs and help take the burden off of IT.  Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Xirrus

Four Tools for Capturing DDoS Attacks
sponsored by Neustar®
WHITE PAPER: This exclusive white paper describes four of the best tools you can use to detect DDoS attacks quickly.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Neustar®

Technical Brief: Wall Mounted Access Points
sponsored by Xirrus
WHITE PAPER: This exclusive technical brief takes an in-depth look at how to manage your network infrastructure to create the most seamless Wi-Fi experience possible. Read on to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Xirrus

Seconds Matter: Resolve Issues Quickly with the World’s FastestRemote Desktop Management
sponsored by Kaseya
WHITE PAPER: As a Managed Service Provider, you know that when you have many users to support, every second counts. Your remote connection speed and reliability are critical to your ability to resolve issues quickly, maximizing IT efficiency and ensuring a happy and productive end user.
Posted: 15 Mar 2015 | Published: 15 Mar 2015

Kaseya

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Top 3 DNS Monitoring Methods
sponsored by Cloudmark
EGUIDE: This expert e-guide walks you through the top three DNS monitoring methods. Additionally, read on to uncover how defense tactics are revealed through DNS attacks.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Cloudmark

Ten Top Network Problems Clients Complain About - and How to Fix Them Fast
sponsored by Fluke Networks.
WHITE PAPER: Access this white paper to get the top 10 network problems technicians face and how to solve them quickly and easily.
Posted: 25 Mar 2015 | Published: 12 Mar 2015

Fluke Networks.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement