HTTP Research
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
Sponsored by: TechTarget SecurityThis eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
-
EMC Isilon Best Practices for Hadoop Data Storage
Sponsored by: EMC IT Solutions India Private LimitedThis white paper describes the best practices for setting up and managing the HDFS service on an EMC Isilon cluster to optimize data storage for Hadoop analytics.
-
Whitepaper: Understanding WAS z/OS Thread Tuning Considerations (April 2013)
Sponsored by: IBMThis diagram that features extensive notes will help you understand the relationship between HTTP clients and thread tuning on WAS z/OS.
-
NSS Labs Network Intrusion Prevention System Product Analysis
Sponsored by: IBMThis resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
Broadcast Delivery of Multimedia Content to Mobile Users
Sponsored by: QUALCOMM IncorporatedDiscover how a broadcast delivery can help you overcome the issues with the currently used HTTP delivery method. Avoid bottlenecks and improve user-experience, all in a cost-effective manner.
-
User Interface Development for Embedded Systems
Sponsored by: Mentor GraphicsAn embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: LogicalisThis paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Move Web Application Security Testing into Your Development Cycle
Sponsored by: IBMThis paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
-
Introduction to MTOM: A Hands-on Approach
Sponsored by: Crosscheck NetworksThis white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.