PKI White Papers

(View All Report Types)
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Seven IT Strategies to Help Survive the Downturn
sponsored by CompuCom Systems, Inc.
WHITE PAPER: The document describes the seven IT strategies worth taking a closer look at that can make a difference and have an impact.
Posted: 09 Apr 2008 | Published: 01 Apr 2008

CompuCom Systems, Inc.

Take a Holistic Approach to Business Driven Security
sponsored by IBM
WHITE PAPER: Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Four Principles for Reducing Storage TCO
sponsored by Hitachi Vantara
WHITE PAPER: This white paper shares proven strategies for storage infrastructure cost reduction. You will uncover four keys to minimizing storage costs and maximizing return on assets based on the tried and tested Storage Economics framework.
Posted: 16 Jun 2009 | Published: 01 May 2009

Hitachi Vantara

Five best practices for deploying a successful service-oriented architecture: Leveraging lessons learned from the IBM Academy of Technology
sponsored by IBM
WHITE PAPER: Check out this white paper to learn about the five best practices for deploying successful SOA and see rapid return on your investment.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Extending E-Business Suite Applications with Oracle Fusion Middleware
sponsored by Oracle Corporation
WHITE PAPER: This white paper details how to maximize your Oracle E-Business Suite investment by addressing the cost and complexity associated with disparate IT environments with SOA. Learn how to achieve optimal flexibility and speed from your IT infrastructure.
Posted: 17 Mar 2008 | Published: 01 Mar 2007

Oracle Corporation

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER