Standards  >   Internet Standards  >  

World Wide Web Protocols

RSS Feed    Add to Google    Add to My Yahoo!
World Wide Web ProtocolsReports
 
CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Web Threats: Challenges and Solutions
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

Trend Micro, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

Proper use of VPN and RPC/HTTPS
sponsored by F5 Networks
EGUIDE: Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

F5 Networks

The F5 Acceleration Portfolio
sponsored by F5 Networks
WHITE PAPER: F5 is the leader in Application Delivery Networking, ensuring applications are secure, fast, and available. This white paper provides an overview of specific F5 acceleration features across three F5 product lines.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

F5 Networks

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement