IT Downloads Results for Type : Research - Page 2

All
All
 
 
Showing 11-20 of 91 Results    
 
 
Full Virtualization Technologies: Guidelines for Secure Implementation and Management

Full Virtualization Technologies: Guidelines for Secure Implementation and Management

  ITDownload  
  |   RESEARCH   |   Sep 26, 2011
 

This paper walks you through the steps needed to successfully roll out virtualization without compromising network security....  More >>

 
Of Passwords and People: Measuring the Effect of Password-Composition Policies

Of Passwords and People: Measuring the Effect of Password-Composition Policies

  ITDownload  
  |   RESEARCH   |   Sep 19, 2011
 

Password policies and results must be evaluated in all aspects of user behavior....  More >>

 
RFID-based Localization and Tracking Technologies

RFID-based Localization and Tracking Technologies

  ITDownload  
  |   RESEARCH   |   Sep 16, 2011
 

This paper looks at various models for employing cost-effective Radio Frequency ID chips to support your location-based technologies.

...  More >>

 
Minimizing Information Leakage in the DNS

Minimizing Information Leakage in the DNS

  ITDownload  
  |   RESEARCH   |   Sep 14, 2011
 

This paper looks at methods for mitigating the risks posed by signature-based DNSSEC extensions....  More >>

 
Data Center Facility Requirements at a Glance

Data Center Facility Requirements at a Glance

  ITDownload  
  |   RESEARCH   |   Sep 02, 2011
 

This research note will help you develop a 360-degree view of costs, requirements and risk.

...  More >>

 
Planning for Data Center Physical Layout and Support Center Space

Planning for Data Center Physical Layout and Support Center Space

  ITDownload  
  |   RESEARCH   |   Aug 31, 2011
 

Get a solid overview of issues involved in the physical design of your new data center with this research note.

...  More >>

 
Fire Protection: Only YOU Can Prevent Data Center Fires

Fire Protection: Only YOU Can Prevent Data Center Fires

  ITDownload  
  |   RESEARCH   |   Aug 15, 2011
 

This research describes fire protection systems, as well as local, state and federal codes.

...  More >>

 
'Effectively Using and Securing the Cloud Computing Paradigm' PowerPoint Presentation

'Effectively Using and Securing the Cloud Computing Paradigm' PowerPoint Presentation

  ITDownload  
  |   RESEARCH   |   May 13, 2011
 

The National Institute of Standards and Technology created this slideshow presentation to provide education on cloud technology and its benefits and generate productive discussion of cloud security....  More >>

 
Authentication and Authorization Framework for Emergency Response Officials (ERO)

Authentication and Authorization Framework for Emergency Response Officials (ERO)

  ITDownload  
  |   RESEARCH   |   Jan 11, 2011
 

Managing credentials and identity is a vital concern in any organization....  More >>

 
Fundamentals of Small Business Information Security

Fundamentals of Small Business Information Security

  ITDownload  
  |   RESEARCH   |   Dec 03, 2010
 

SMBs must become more security-conscious as they become more attractive targets....  More >>

 
 
 
Pages:   « Prev1 | 2 34Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.