WWW Browsers Reports

Web Browser Security Features Make Attacks Harder
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

TechTarget Security

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

All resources sponsored by Encoding.com

Handling Mobile Web Pages Better
sponsored by QUALCOMM Incorporated
EBOOK: In this white paper, find out how to get higher performance out of browser and JavaScript™ engines. Discover how to take advantage of Web Technologies optimizations to provide a user experience befitting the Truly Mobile Web.
Posted: 23 Jun 2011 | Published: 23 Jun 2011

QUALCOMM Incorporated

Hamilton Health Sciences brings care to the bedside with Citrix Receiver
sponsored by Citrix
WHITE PAPER: Healthcare traditions are changing and physicians are adopting more mobile practices. Access this informative white paper to learn more about how adopting mobile devices can improve patient care and physician productivity.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

Presentation Transcript: SEQUEL: The Triathlete of Data Access
sponsored by SEQUEL-Software
PRESENTATION TRANSCRIPT: This transcript describes  how data access supports System i operations. Discover the key features and functions of a business information tool that caters to 3 System i user needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SEQUEL-Software

Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links
sponsored by Mimosa Systems
WHITE PAPER: This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange.
Posted: 07 Oct 2008 | Published: 03 Oct 2008

Mimosa Systems

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by TechTarget Security
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

TechTarget Security

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Executive Brief: OpenText Web Experience Management
sponsored by OpenText
WHITE PAPER: Building and maintaining a comprehensive website has recently become a primary area of focus for many organizations. This white paper outlines expectations and what you need to create a compelling and meaningful conversation between website, brand and user across a myriad of devices and platforms.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

OpenText