In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing on the routes Mobile Network Operators (MNOs) taking to develop new business models.
This brief case study reveals how the right billing system enabled communications provider IMN to meet the needs of sales growth by supporting enterprise-wide billing and customer management.
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Application development organizations have a wide variety of programming languages and technologies to choose from. In this white paper learn how Oracle Database 11g delivers a highly productive and powerful set of application development tools.
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines