Find articles, key websites, books, the latest industry news,
job announcements, ejournals, eprints, technical reports,
the latest research and more!
In Engineering, Mathematics, and Computing

Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Security Applications

Browse through our extensive list of free Security Applications magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Computer and Hacking Forensics - FREE Video Training Course Learn how to determine potential online criminal activity, legally gather..
Pure Storage Provided Significant Capital And Operational Savings See how using Pure's all flash storage in a healthcare environment can..
Essentials of Online Payment Security and Fraud Prevention: Free eBook! (a $29.99 value) Essential guidance for preventing fraud in the..
Ransomware Hostage Rescue Manual Free your files! Get the most informative and complete Ransomware Hostage Rescue Manual...
Best Practices in Virtual Desktop Infrastructure Implementation For an industry that places a premium on data security and increasingly..
How to Transform Employee Worst Practices Into IT Security Best Practices Prevent your worst data breach nightmare with New School Security..
How Safe Are Home Security Systems? Home security and remote monitoring systems are one of the immediate applications for the Internet of..
Citrix NetScaler: Una poderosa defensa contra los ataques de denegación de servicio Aprenda cómo Citrix NetScaler puede ayudar a..
2016 Top Trending IT Security Resources Download this kit to learn everything you need to know about IT Security...
How to Deal with Stealthier Phishing and Malware Attacks Learn key IT Security best practices like how users can be mobilized as your first..
Your Money or Your Files! A Short History of Ransomware Cybercrime ransomware attacks are evolving rapidly. Take effective countermeasures..
10 Best Practices for Microsoft SharePoint Security SharePoint is a valuable collaboration tool. But your organization could be vulnerable..
Build a Strong End User Security Strategy with These 3 Components Find out how to equip your business with a complete, easy-to-manage,..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
Defender as propriedades web móveis ocultas Saiba mais sobre como produzir uma melhor segurança, confiabilidade e desempenho..
Relatório de defesa contra ataques cibernéticos 2015 - Resumo executivo (Um relatório do CyberEdge Group) Saiba como os aplicativos da..
Informe sobre defensa frente a ciberamenazas 2015. Resumen ejecutivo (Un informe de CyberEdge Group) Descubra cómo impactan las..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
Relatório de defesa contra ataques cibernéticos 2015 - Resumo executivo (Um relatório do CyberEdge Group) Saiba como os aplicativos da..
Defender las propiedades web de las amenazas modernas con Citrix NetScaler Obtenga la visibilidad y control para gestionar, acelerar y..
State of Security Operations: 2015 Report of Capabilities and Maturity of Cyber Defense Organizations Your ability to detect and stop cyber..
Choosing a Cloud Hosting Provider with Confidence Thawte SSL certificates provide a secure bridge to trusted cloud hosting providers...
History of Cryptography An easy to understand history of Cryptography...
Top 10 Website Security Myths Revealed When it comes to protecting your website and customers from attack, knowledge is your best weapon...
Simplify SSL Certificate Management Across the Enterprise The need for SSL certificates has moved well beyond the “Buy” page to..
Securing Microsoft Exchange 2010 There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,..
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
NAC at the Endpoint: Control Your Network Through Device Compliance Learn why NAC at the endpoint is the most effective way to manage who..
How to Attain PCI Compliance Learn how eEye Digital Security can help you audit for and comply with the PCI Standard Security Standard...
The State of Resilience & Optimization on IBM Power Systems (System i and System p) Read this review to learn the data protection, recovery..
Protecting Enterprise Data on the Endpoint: A Strategic Approach Ensure Data Protection on Laptops, Smartphones & Memory Sticks...
Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions Discover how to solve the need for..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Top Five Recommendations for Encrypting Laptop Data Learn how to protect laptop data from loss or theft, and save on storage and IT..
BYOD Risks and Rewards Whether you're an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the..
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Endpoint Security Strategies: Part II Aberdeen Group's endpoint data protection benchmark report identifies successful strategies,..
How To Cost-Effectively Manage The Security of Your Company's IT Infrastructure A growing number of small and medium sized businesses, with..
30 Steps to a Secure Organization: A No Nonsense Approach to Objectively Evaluating Your Information Security 30 Steps to a Secure..
Secure and Control Data across All Mobile Endpoints Learn how CREDANT's Mobile Guardian Enterprise solution delivers advanced mobile data..
Secure Corporate Data with Policy-Based Intelligent Encryption Hear about CREDANT's next-generation encryption solution, offering better..
Resilience & Optimization on IBM Power Systems: Surveys of IBM i and AIX Users Read this review of the data protection and recovery..
Enterprise Security for Financial Services As commerce moves online to realize cost-savings and efficiency gains, financial services become..
High Availability on IBM System i (AS/400) - An Introduction Get more value out of your business-critical AS/400 and iSeries systems!..
Contractor Access: Mitigating Security and Risk Issues Having contractors doesn't have to mean increased risk...
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
IDC Spotlight: Access Control and Certification Read this brief for best practices on managing user access compliance...
Storage Source Magazine This newly premiered publication is a one-stop source for storage strategies and management, offered exclusively by..
Modern Data Protection of Epic Environments While Epic deployment is widespread in Healthcare Delivery Organizations, protection of those..
Mobile Security: More than Just Encryption Outlines four key requirements for implementing an effective and flexible enterprise-class mobile..
NAC 2.0: A New Model for a More Secure Future Learn why NAC 2.0 is the future of Network Access Control...
Five Reasons Why Smaller Organizations Should Consider System i (AS/400) High Availability Learn why true High Availability and Disaster..
Status von Sicherheitsmaßnahmen: Bericht über Fähigkeiten und Reifegrad von Organisationen für Cyberabwehr von 2015 Ihre..
Next-Generation Disaster Recovery and Availability Technologies for AIX and IBM i (i5/OS) on IBM Power Systems Review the technology..
The Cost of Inertia: Insight from Data Protection Predictors Iron Mountain reveals study findings on the possible future of data safety and..
Achieving Rapid Data Recovery for IBM AIX Environments Read how EchoStream for AIX leverages CDP technology to support instantaneous..
Ensuring Immediate and Appropriate User Access in the Healthcare Industry Learn how Children's Hospital Boston used security management..
Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats By downloading this free guide, you agree to receive regular updates..
The Benefits of AIX Data Replication in HACMP Clusters Learn How to Protect the Data as Well as the Server with Real-Time Data Replication...
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
Oracle Product Brief: Oracle Identity & Access Management Suite & Oracle Database Security Why your organization needs identity and access..
Who Leads in WLAN Security? Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue..
Getting Started with Java EE Security This Refcard will provide you with an in-depth introduction to Java EE Security, which supports a fine..
Cryptographic Storage Cheat Sheet This cheat sheet provides a simple model to follow when implementing solutions for data at rest...
Next-Generation Disaster Recovery and Availability Technologies for AIX and IBM i (i5/OS) on IBM Power Systems Review the technology..
Payment Card Industry Compliance and Primary Response This white paper examines solutions to overcome Payment Card Industry (PCI)..
Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into their datacenters,..
NAC: Managing Unauthorized Computers Learn how your enterprise can combat today's threats and still remain nimble enough for tomorrow's..
Best Practices for Access Certification Is your company using best practices to certify user access is in accordance with policy?..
6 Modern Security Tools for Windows 8 By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
Want To Know Who's Trying To Unlock Your Phone? Catch Them In The Act By downloading this free guide, you agree to receive regular updates..
5 Ways Your VMware and Hyper-V Backups May Fail You HA technology is fantastic and is great for protecting VMs in certain situations but it..
Estado de las operaciones de seguridad: informe de 2025 sobre las capacidades y la madurez de las organizaciones de defensa cibernética Su..
   
Copyright © 2016 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices

 
Home | About | Help | Feedback | Updates

An initiative of Heriot-Watt University

Valid XHTML 1.0 Transitional