UNIX to UNIX Encoding White Papers

(View All Report Types)
Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Symantec Corporation

The Rational Approach to Automation
sponsored by IBM
WHITE PAPER: Learn how team collaboration, task automation, and extensive measurement and analysis can benefit your organization in this white paper, which can help you automate many of your software production and creation activities.
Posted: 17 Mar 2010 | Published: 17 Mar 2010

IBM

Vendor Landscape: Virtual Backup Software
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to evaluate virtual backup software to end the arguing between virtual and backup admins. Read on to consider a solution to back up your virtual infrastructure, understand what's new in the virtual backup market, and determine which products are most appropriate for particular use-cases and scenarios.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Dell Software

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell EMC and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell EMC and Microsoft

Systems Management Simplified: The Dell Management Console
sponsored by Dell and Symantec
WHITE PAPER: The Dell Management Console redefines much of the systems management paradigm, through a holistic, Web browser–based “single pane of glass” approach to managing enterprise-wide IT assets. Read on to learn more.
Posted: 25 Sep 2009 | Published: 23 Sep 2009

Dell and Symantec

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 14 Nov 2013 | Published: 31 Mar 2012

IBM

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd