Cellphone Spam White Papers

(View All Report Types)
Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

The Top Five Myths of IP Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper addresses the top concerns of IT professionals who resist the deployment of pervasive, enterprise-wide wireless networks. It identifies these reservations based on the experience of Cisco Systems and Intel.
Posted: 10 Jul 2008 | Published: 25 Jul 2006

Cisco Systems, Inc.

Securing Business Communications Applications in Converged Networks - Best Practices
sponsored by Avaya Inc.
WHITE PAPER: Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
Posted: 10 Jun 2008 | Published: 01 Jul 2005

Avaya Inc.

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER: This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008

Bloxx, Inc.

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Efficient Installation and Operation of Terminal Server Farms
sponsored by visionapp
WHITE PAPER: This whitepaper describes some of the potential issues that may be encountered with the installation and operation of terminal servers and explains straightforward ways to resolve them.
Posted: 09 May 2008 | Published: 01 Sep 2005

visionapp

IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!
Posted: 11 Jan 2010 | Published: 15 Dec 2008

Iron Mountain

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER: This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008

Symantec Corporation

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.