ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • E-Guide: The dangers of application logic attacks

    Sponsored by: TechTarget Security

    Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • Solution Brief: Managing the WAN to Optimize Business

    Sponsored by: BlueCoat

    Bandwidth management is a common technique employed by IT organizations to improve quality of service over the WAN. It typically involves assigning guaranteed levels of bandwidth and traffic prioritization to improve application performance.

  • IBM DB2 and IBM Power Systems: Transform information into insight and accomodate rising transaction volume - NEW! (Translated) 

    Sponsored by: IBM

    This paper explains how the synergy of DB2 and Power Systems can help businesses simplify deployment of Web applications, achieve cost-effective large-scale processing, construct a large-capacity messaging backbone and consolidate workloads-- all accelerating your time to value

  • Presentation Transcript: Save Money with Cloud Computing and Google Apps

    Sponsored by: Google Apps

    Read this transcript, as Google Apps Expert, Rhonda Stites, walks through a simple financial model that evaluates the savings in adopting Google Apps. You will hear about real customers and their experiences.

  • Presentation Transcript: Implementing Cloud Ready Data Management Strategy

    Sponsored by: VMware, Inc.

    Today's modern, web applications require elasticity, scalability and flexibility. Learn how a cloud-ready approach to data management can help reduce database bottlenecks and improve application performance and availability. Read this presentation transcript and learn how to achieve high performance for your apps.

  • Transaction Tracing through Complex Web Applications

    Sponsored by: Dell Software

    To ensure that application slowdowns and other revenue-impeding application issues are isolated, diagnosed and fixed quickly, sometimes it’s necessary to trace transactions from their source across all of the technology domains that contribute to transaction response time. Read this paper now to learn more.

  • E-Guide: Best Practices for Developing Secure Applications

    Sponsored by: IBM

    This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.

  • The Shortcut Guide to Assuring Website Performance through External Web Monitoring

    Sponsored by: Neustar®

    Businesses have become dependent on Web sites and RIAs. As dependency increases, so does the complexity of Web site systems and expectations on service delivery. This book offers a detailed look at external monitoring, how to leverage monitoring to protect your brand and a roadmap for implementing and maintaining an external monitoring process.

  • Is Your Load Balancer Cloud-Ready?

    Sponsored by: Citrix

    Build a Cloud computing infrastructure with maximum availability, performance and security. This white paper shows how you can support public, private or hybrid Cloud configurations, scale app delivery, and support multi-tenant environments with the best load balancing technology.

  • IBM WebSphere eXtreme Scale and WebSphere DataPower XC10 Appliance

    Sponsored by: IBM

    Learn how elastic caching solutions in your distributed environment can empower the application performance you need to obtain business agility and thrive against the competition while managing costs.

  • Integrating IBM WebSphere Portal and IBM Mashup Center Software

    Sponsored by: IBM

    This white paper outlines the potential integration options between IBM WebSphere® Portal and IBM Mashup Center software. Organizations can implement these integration options to achieve greater flexibility while lowering costs.

  • Presentation Transcript: Save Money with Cloud Computing and Google Apps

    Sponsored by: Google Apps

    Read this transcript, as Google Apps Expert, Rhonda Stites, walks through a simple financial model that evaluates the savings in adopting Google Apps. You will hear about real customers and their experiences.

  • NetScaler VPX: Harness the Power of Virtualized Web App Delivery

    Sponsored by: Citrix

    This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.

  • Customer Satisfaction with Application Delivery Controller Vendors

    Sponsored by: Citrix

    Enterprise Management Associates Report: "Customer Satisfaction with Application Delivery Controller Vendors" - shows how Citrix NetScaler beats F5 and Cisco in customer satisfaction. Discover why Citrix is superior in 16 out of 21 categories and tops the competition in Presales, Tech Support, Product, Technology, and Overall Business Value.

  • Technology Audit: Imperva SecureSphere Data Security Suite

    Sponsored by: Imperva

    Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.

  • SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies

    Sponsored by: TechTarget Search Windows Server

    When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.

  • Control IM, P2P and Streaming Applications

    Sponsored by: BlueCoat

    Blue Coat’s secure Web gateway solution provides network administrators with the tools to control Internet applications, such as IM, P2P and streaming applications. Deployed between internal users and external applications, such as IM datacenters, ProxySG intercepts all outbound and inbound communications.

  • Application Awareness for Service Providers

    Sponsored by: BlueCoat

    Managed Service Providers (MSPs) can inject application awareness into their services as their next value-add and as a critical differentiator. Anyone offering managed services, either on-premise, in the cloud or as a hybrid solution, must build application awareness into their infrastructures from the bottom up.

  • Zynga Grows to #1 Social Gaming Site with RightScale

    Sponsored by: RightScale

    With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.

  • Managing a Growing Threat: An Executive’s Guide to Web Application Security

    Sponsored by: IBM

    Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.

  • Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities

    Sponsored by: IBM

    Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.

  • Designing a Strategy for End-to-End Web Protection

    Sponsored by: IBM

    Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.

  • Web Platform Installer 2.0

    Sponsored by: Microsoft

    In one neat package, the Web Platform Installer gives you the frameworks, web server, database, tools and applications you need to quickly build and run Web applications and solutions on Windows.

  • Web application security: automated scanning versus manual penetration testing

    Sponsored by: IBM

    There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.