Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Internet Piracy

RSS Feed   
Internet Piracy White Papers (View All Report Types)
 
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER: The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Mendix

RPA and Low-Code BPA: An omnichannel approach to process transformation
sponsored by Mendix
WHITE PAPER: More businesses are recognizing the benefits and operational advantages of low-code development and businesses process automation in IT. Download this whitepaper to take advantage of the 3 RPA methods included.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Mendix

Leveraging Maintenance and Repair Data to Support Operations Excellence
sponsored by Hitachi Vantara
WHITE PAPER: Use this industrial IoT guide to understand how you can enhance maintenance approaches with IoT data and ultimately reduce labor and repair costs.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Hitachi Vantara

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

Challenges & Strategies for UK Annuity Providers
sponsored by Wipro
WHITE PAPER: This white papers talks about the challenges facing the UK annuity market and the strategies that can be taken by the product providers to meet them. The paper also talks about how Wipro can partner with providers to tap the opportunities present in the marketplace.
Posted: 13 May 2009 | Published: 11 May 2009

Wipro

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info