Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • eBooks // Oct 2012

    eBook - Real-World Virtualization for Your Business

    Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive, and saving money for the bottom line. It's a new way to think about IT--and...

    Provided By VMware

  • eBooks // Sep 2012

    Defining Big Data

    Big Data is one of the hottest IT terms in the marketplace today. Not only are business teams asking for the benefits of exploiting it, but IT teams are still getting their heads around how Big Data can be leveraged in their organization. There are definitely some questions you should...

    Provided By Slalom Consulting

  • eBooks // Aug 2012

    Maximized Warehousing and Analytics in The Era of Big Data

    Enterprise IT leaders have to look beyond the glib buzz words of 'big data' to figure out what the real impact and opportunities are for their organizations. Automation extends into every aspect of business operations today, with a wealth of new data sources such geo-location, RFID instrumentation and web interactions....

    Provided By IBM

  • eBooks // Apr 2012

    eBook: Unleash Your People Power with World-Class HCM Applications in the Cloud

    The beauty of the cloud is that you can get up and running fast.The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM...

    Provided By Oracle

  • eBooks // Apr 2012

    Understanding and countering new threats in cybersecurity

    The Internet has brought us great wonders and great capabilities, but has also introduced a new and dark threat to our theaters of operation. How can you make certain that your primary mission remains carrying out your mandate, not defending against cyberattacks? Fortunately, network-based security services provide a first...

    Provided By AT&T

  • eBooks // Feb 2012

    eBook "Real-World Virtualization for Your Business"

    Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive, and saving money for the bottom line. It's a new way to think about IT...

    Provided By VMware

  • eBooks // Aug 2011

    eBook: A Guide to Modern IT Disaster Recovery

    This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter. Practical, how-to best practices, real customer success testimonials and links to additional resources.

    Provided By VMware

  • eBooks // May 2011

    Free e-book: Getting Started with DB2 Application Development

    Free e-book: Getting Started with DB2 Application Development. Learn how easy it is to get started on DB2 application development. This e-book includes topics such as using DB2 Express-C, writing SQL statements, working with open source tools and more. Part of a full e-kit designed for fast, easy DB2 learning.

    Provided By IBM

  • eBooks // Apr 2011

    Storage Tiering for Dummies e-book

    Welcome to Storage Tiering For Dummies, Oracle Special Edition. Today, explosive growth in storage requirements due to technology shifts, unstructured data, and regulatory mandates is more than traditional storage techniques can handle. IT budgets cannot support the growth necessary without a change in storage practices. Tiered storage is the smart...

    Provided By Oracle

  • eBooks // Nov 2013

    E-Guide: Intelligent Networking: reliable, robust, resilient, redundant, and really, really fast

    The numbers are truly breathtaking. Verizon estimates that by 2016, there will be three devices for every person connected to the Internet. By 2020, there will be 50 billion (with a “B”) connected devices. With data sources including video, audio, photographs, live fitness data, all that mobile data, and machine-to-machine...

    Provided By Verizon

  • eBooks // Feb 2013

    Get the skills you need with an Information Assurance master’s degree

    Information Assurance Degree - Online or On-Campus The world's dependence on computers and information systems continues to deepen, creating a growing, but increasingly competitive, market for information technology professionals. Organizations of all types need to ensure that the confidentiality and integrity of data are protected at all times. Regis University's...

    Provided By Regis University

  • eBooks // Oct 2013

    From Zero to 60…Build Great Digital Experiences at the Speed of the Web with Acquia Cloud Site Factory

    Today’s marketplace couldn’t be more competitive. Staying ahead of the competition means being able to respond to a changing market instantly.Launching a marketing campaign, a new brand, or even a new family of brands can mean the difference between success…or trailing the pack.Acquia Cloud Site Factory (Site Factory) offers a...

    Provided By Acquia

  • eBooks // Apr 2012

    Understanding and countering new threats in cybersecurity

    The Internet has brought us great wonders and great capabilities, but has also introduced a new and dark threat to our theaters of operation. How can you make certain that your primary mission remains carrying out your mandate, not defending against cyberattacks? Fortunately, network-based security services provide a first...

    Provided By AT&T

  • eBooks // Mar 2013

    eGuide: A prescription for IT efficiency

    Security is more important in the healthcare setting than many other industries. Breaches of patient data can result in HIPAA violations and government investigations. Breaches of system security can cause breakdowns of equipment used to sustain life and patient health. Phishing expeditions can cause thousands or millions of dollars to...

    Provided By Dell & Microsoft

  • eBooks // Jul 2014

    Agile in the embedded world

    This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

    Provided By IBM

  • eBooks // Mar 2014

    2014 Cloud Guide: Insights For a Great Migration

    The cloud space is noisy—full of opinions, statistics and data. There’s plenty of information out there—but knowing what and who to trust can be a challenge. Here’s a quick look at important cloud computing trends and a short list of trusted resources that will point you in the right direction....

    Provided By Windstream Communications

  • eBooks // Jun 2014

    Beyond Next-Generation Firewalls

    Cyberattacks are increasing every year, in both number and variety. But whether the malicious goal is money, espionage or disruption, you can protect your network and your business by applying the right security technology. Malicious actors have been innovating at a ferocious pace, and three- or four-year-old firewalls simply...

    Provided By Dell Software

  • eBooks // Aug 2014

    Sensible Service Management eBook

    This Sensible service management guide written by Rob England, the IT Skeptic, aims to cut through all the noise and jargon to tell IT managers why service management can be useful and why it doesn’t need to be so complex. The guide is broken into 11 best practices. Check this...

    Provided By Citrix