Anonymous FTP White Papers

(View All Report Types)
7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017

TechTarget ComputerWeekly.com

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 08 Feb 2021 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

The Ultimate Guide to Using Cybersecurity AI
sponsored by Adlumin
EGUIDE: This e-book explores how AI enhances cybersecurity by quickly analyzing data, detecting anomalies, and automating processes. Learn how AI can improve threat detection, triage, investigation, and response to strengthen your security posture. Read the full e-book to discover the benefits of AI-powered cybersecurity.
Posted: 14 Nov 2024 | Published: 14 Nov 2024

All resources sponsored by Adlumin

Threat Report 2024
sponsored by Arctic Wolf
RESEARCH CONTENT: Ransom demands are increasing 20% year-over-year, “Artic Wolf Labs Threat Report 2024” finds, rising to a staggering $600,000 USD. How can you defend your business against that dangerous trend? And what other threats should you watch out for in the cyber landscape? Dig into the report to unlock insights.
Posted: 07 Mar 2024 | Published: 07 Mar 2024

TOPICS:  .NET
Arctic Wolf

In 2017, the insider threat epidemic begins
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
Posted: 08 Feb 2021 | Published: 28 Feb 2017

TechTarget ComputerWeekly.com

2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Cato Networks: The Cato CTRL SASE Threat Report
sponsored by Cato Networks
RESEARCH CONTENT: Cato Networks' Q1 2024 SASE Threat Report provides an in-depth look at the evolving cyber threat landscape. Discover the latest tactics used by threat actors, including AI tool abuse and deep fakes. Learn how to improve your enterprise security posture. Read the full report.
Posted: 26 Jun 2024 | Published: 26 Jun 2024

Cato Networks

How to Manage SAP User Accounts and Access Rights with Identity Manager
sponsored by One Identity
WHITE PAPER: Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
Posted: 05 Jun 2024 | Published: 05 Jun 2024

TOPICS:  .NET
One Identity

How best to put collaboration tools to work for your team
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This collection of recent expert advice aims to make your quest for the best option a bit easier. Read on and learn the latest on what collaboration tools now offer, including advanced technology like AI and speech recognition.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill