Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >   Web Browsers  >  

Microsoft Internet Explorer

RSS Feed   
Microsoft Internet Explorer Reports
 
Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Overcoming Applications Barriers to Windows 7 Migration
sponsored by Symantec Corporation
WHITE PAPER: This paper outlines the applications barrier to Windows 7 migration, explores alternative ways to resolve it, presents Altiris Deployment Solution, and illustrates its compelling advantages for your Windows 7 migration and beyond.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Symantec Corporation

Computer Weekly buyer’s guide to Windows XP support
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Microsoft will end technical support for its Windows XP operating system in April 2014. Computer Weekly looks at what this means for those businesses that have yet to migrate to newer alternatives.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

HOW TO PROTECT AGAINST THE OWASP TOP 10 AND BEYOND
sponsored by F5 Networks
WHITE PAPER: The Open Web Application Security Project (OWASP) was developed by security professionals to critically assess web application security. This eBook evaluates the OWASP Top 10 vulnerabilities and mitigations putting web applications at risk. Download the eBook to learn how to best protect your applications.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

F5 Networks

Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 12 Aug 2019 | Published: 13 Aug 2019

ComputerWeekly.com

HPE Ezmeral Software Portfolio Is a Bold Move Into the Container Platform
sponsored by HPE and Intel®
WHITE PAPER: In this report, IDC analysts dive into HPE Ezmeral – a new brand and software portfolio which covers capabilities like container orchestration and management, AI/ML and data analytics, AI-driven operations, and more.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

TOPICS:  Software
HPE and Intel®

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 11 Jan 2019 | Published: 11 Jan 2019

ComputerWeekly.com

CW ANZ: Taming the data beast
sponsored by ComputerWeekly.com
EZINE: Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info