IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed    Add to Google    Add to My Yahoo!
Windows FlawsReports
 
CW Buyer's Guide: Windows 8
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

ComputerWeekly.com

Embracing Microsoft Vista for Enhanced Network Security
sponsored by Lumeta Corporation
WHITE PAPER: This white paper examines the steps to take when migrating and implementing Windows Vista and discusses how to mitigate risks, reduce costs and improve overall security.
Posted: 08 Mar 2007 | Published: 01 Mar 2007

Lumeta Corporation

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.
Posted: 27 Aug 2007 | Premiered: Oct 10, 2007, 12:00 EDT (16:00 GMT)

Shavlik Technologies

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST: Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)

Lumeta Corporation

E-Book: Technical Guide on Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

SearchSecurity.com

BareTail
sponsored by Bare Metal Software
TRIAL SOFTWARE: Free real-time log file monitoring tool for Windows.
Posted: 05 Dec 2006 | Premiered: 19 Jun 2007


The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006

Verio

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell and Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement