Search Results for: %3Ca href%3D%22%22%3E%3C%2Fa%3E

   All     White Papers   Multimedia   IT Downloads 
31 - 40 of 9334 Matches Previous Page  |  Next Page
Exclusive Comparison of Server Performance and Power Consumption
Choosing the right hardware for your virtual environment can be a painstaking process, especially since it is difficult to predict how a platform will perform once it is deployed. This white paper examines one hardware configuration and measures the number of orders per minute and virtual machines it can support.

Dell, Inc. and Intel

Kingminer –a Crypto-Jacking Botnet Under the Scope
Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.

Bitdefender

Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign
Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

Bitdefender

A Guide to Verifying Users in E-Commerce
In this guide, learn how to prevent fraud before it happens and protect buyers and sellers with phone verification with two-factor authentication.

Vonage

Oracle Solaris 11 Administrator's Cheat Sheet
Access this cheat sheet to find step-by-step instructions for installing and configuring Oracle Solaris 11.

Oracle Corporation

Re-birth of the IT Budget?
Against a backdrop of increased use of software that is generally more sophisticated, flexible, scalable and easy to use than it was 5 years ago, this research set out to explore the impact of having to maintain a plethora of different software solutions in today’s cash-strapped corporate environment.

ComputerWeekly.com

Kubernetes and Beyond
In this white paper, find key research findings regarding the current state of Kubernetes usage, opportunities and challenges of using Kubernetes, and key considerations for management and use of Kubernetes at scale.

Rancher

Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.

ComputerWeekly.com

Quad-Core Intel® Xeon® Processor 5400 Series- Product Brief
Core Intel® Xeon® processor 5400 series help provide your data center or business with the performance headroom needed to confidently consolidate applications onto fewer systems using proven virtualization solutions.

Intel Corporation

Fighting Fraud
In this issue of the Fighting Fraud e-newspaper, observe a series of articles dedicated to highlighting the global trends, challenges and advancements as they relate to fraud. Key topics covered in this issue include Brexit, artificial intelligence, insider threats, the true cost of cybercrime, and more.

Dtex
31 - 40 of 9334 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info