Standards  >   Internet Standards  >  

WWW Protocols

RSS Feed    Add to Google    Add to My Yahoo!
WWW ProtocolsReports
 
IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Web Threats: Challenges and Solutions
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

Trend Micro, Inc.

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

How to Migrate CORBA Applications to Web Services
sponsored by Rogue Wave Software
WHITE PAPER: This white paper discusses the steps necessary for migrating CORBA applications to Web services. Learn how to evolve existing applications without sacrificing business logic.
Posted: 21 Jul 2008 | Published: 01 Jul 2008

Rogue Wave Software

Introduction to MTOM: A Hands-on Approach
sponsored by Crosscheck Networks
WHITE PAPER: This white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.
Posted: 03 Jan 2008 | Published: 21 Dec 2007

Crosscheck Networks

WS_FTP Professional and WS_FTP Server with SSH
sponsored by Ipswitch WhatsUp Gold
DATA SHEET: Secure file transfer products enable businesses to manage data, control access, and securely move files between locations. This white paper highlights how going beyond the basic FTP solutions is necessary for secure and reliable file transfer.
Posted: 01 Aug 2007 | Published: 01 Jul 2007

Ipswitch WhatsUp Gold
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement