Find articles, key websites, books, the latest industry news,
job announcements, ejournals, eprints, technical reports,
the latest research and more!
In Engineering, Mathematics, and Computing

Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Security Management

Browse through our extensive list of free Security Management magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Drones for Dummies (FREE eBook Valued at $16.99) Plus a Chance to Win a Parrot Bebop Drone! Download Drones for Dummies and you'll be..
Online Penetration Testing and Ethical Hacking - FREE Video Training Course At the conclusion of this training course, you'll be able to..
System Administration & Security - Salary & Skills Report What you need to know to earn more in system administration and security...
Server Security: Not What It Used to Be! This IDC Technology Spotlight highlights how cloud computing and virtualization have transformed..
Encryption as an Enterprise Strategy In the last 10 years, the number of data breaches has grown dramatically...
Practical Guide to IT Security Breach Prevention Part II Learn how to reduce mobile, web and social media risks from a security breach...
Schrodinger Helps Pharmaceutical Researcher Make Breakthroughs Sooner with the Help of AWS Find out why Schrodinger turned to Amazon Web..
Combating First-Party Fraud - A New Approach Learn about the challenges involved in combating first-party fraud and emerging best practices...
Reduce Your Open Source Security Risk: Strategies, Tactics, and Tools Learn how to create an open source management strategy and become..
Building Effective Controls to Detect and Prevent Fraud Learn what you need to understand about fraud, how to manage controls to detect and..
Complying with PCI DSS Requirements with DataStax and Vormetric Discover a comprehensive data security solution that is also PCI DSS..
Insurance Carriers: Growth Through Third-Party Products The future growth of insurance carriers depends on a dizzying array of factors...
Defend Against Injection-based Attacks Explore some of the most common security vulnerabilities currently plaguing the software development..
The Importance of Cyber Resilience and Incident Response for Financial Institutions For most financial institutions, it's no longer a..
Financial Institution Threat Report The latest data and analysis collected from 954 financial institutions on the security incidents that..
Entra la nueva economía, salen las estrategias antiguas: una mirada a MES Conozca la herramienta que puede ayudar a transformar la planta..
Five Strategies for Email Insider Threat Prevention Best practices to help prevent sensitive information leakage, while keeping up with the..
Discovering the Unknown: Reducing the Risk of Unauthorized Access to Enterprise Applications and Resources Learn how to maintain an..
Managed Appliances: Security Solutions That Do More Learn how managed appliances enable efficient security management by reducing daily..
Business Justification for Privilege Management Learn the benefits Enterprise IT Managers gain by deploying privilege management solutions..
Mitos y Realidades de la Manufactura que Conecta la Gerencia y el Personal de Planta Necesidad de conectar el personal de planta con el..
Addressing Red Flag Requirements Learn how to use SIEM to implement compliance monitoring...
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
3 Key Benefits of Desktop Lockdown with Privilege Management Learn about the advantages when end users are operating without local..
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the effort out of log management and gain the..
Isn't The Cloud Already Secure? Learn how to protect corporate data in the cloud...
Security and Compliance in the Cloud As an IT professional, learn how to build a cloud-ready security program...
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Network Security Report: The State of Network Security in Schools Discover what IT administrators find most challenging about securing their..
Security: The Wireless Revolution is Here Learn to address security risks in wireless handheld computing systems with a solution that..
Securing Sensitive Data in File Shares View this on-demand webinar to learn how to effectively manage access to data in file shares...
Best Practices for Security Remote and Mobile Devices Discover the best practice approach to mobile and remote security designed to..
The Clock is Ticking on Windows Server 2003 Support This white paper reviews the risks facing organizations running End-of-Life (EOL)..
Security and HIPAA Compliance: Meeting the Challenge of Securing Protected Health Information Providing greater risk visibility, NetIQ..
SANS Review of NetIQ Sentinel 7 A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Shenk..
The Complete Guide to Log and Event Management This white paper analyzes the relationship between SIEM and log management, focusing not only..
To Outsource or Not to Outsource: That is the Network Security Question This paper discusses how to cost-effectively turn the tables on..
Mobile Security: How to Secure, Privatize, and Recover Your Devices: Chapter 3 - Privacy - Small Word, Big Consequences Learn how to keep..
The Complete Guide to Log and Event Management This paper analyzes the relationship between SIEM and log management and architecting their..
HackerProof: Your Guide to PC Security By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
CREDANT® Mobile Guardian® External Media Shield Discover how to access and update external media from any computer without compromising..
Best Practices for Public Cloud Security This Forrester white paper follows “The Cloud Manager's Balancing Act,” which describes..
Changing the Security Monitoring Status Quo Solving SIEM problems with security analytics...
The Value of QRadar® QFlow and QRadar® VFlow for Security Intelligence As the security threats facing organizations have grown..
Contractor Access: Mitigating Security and Risk Issues Having contractors doesn't have to mean increased risk...
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Picking a Sensible Mobile Password Policy for Your Employees SilverSky's Chief Technology Officer discusses six policy elements that will..
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the effort out of log management and gain the..
Finding a Cure for Downtime 7 Tips for Reducing Downtime in Healthcare Information Systems..
Securing Your Future in the Cloud 10 key questions to ask when assessing & selecting a cloud services vendor...
The Executive Guide to Data Loss Prevention Reported data breaches increased by nearly 50 percent in 2008 and industry and regulatory..
SANS Review of NetIQ Sentinel 7 A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Shenk..
Snake-in-the-Grass Syndrome Protect Private Information through Redaction: Analysis and Recommendation..
Single Sign-On: with Passwords, Less is More Is password fatigue inhibiting the productivity of your workforce?..
Achieving Configuration Compliance in a Regulatory Framework Find out how to achieve automated configuration compliance with an appliance..
Comprehensive Review of Security and Vulnerability Protections for Google Apps Find out how Google protects and secures your company's..
The Complete Guide to Log and Event Management Security Information and Event Management (SIEM) technology has existed since the late 1990s,..
The Case for Security Information and Event Management (SIEM) in Proactive Network Defense Critical elements of effective SIEM systems..
Five-Step Plan for Securing Your Enterprise WLAN Decomposes the challenge of securing an enterprise WLAN and recommends best practices to..
Authentication Solutions Through Keystroke Dynamics Provides an in-depth study of keystroke dynamics and how it's used today to fully secure..
Accelerate Insight for Financial Services: Reduce Risk. Stop Fraud. Increase Profits. Learn how the ParAccel Analytic Database (PADB)..
It's Time Businesses Wake Up to Mobile Security Reality Ready or not, you need an MDM solution...
5 Strategies for Email Data Loss Prevention The average employee sends and receives about 110 emails each day or 29,000 emails per year...
Extracting Value from Enterprise Log Data Leverage a log management solution to automate security monitoring and regulatory compliance,..
SANS Analyst Review - Log Management SANS Analyst Review of Log Management, highlighting ArcSight Logger, by analyst Jerry Shenk...
The Complete Guide to Log and Event Management Learn about SIEM and Log Management use cases, differences, best practices and common..
IT GRC Turning Operational Risks into Returns Learn how to turn your company's IT GRC processes into strategic assets...
Why Cloud-Based Security and Archiving Make Sense Learn how email archiving has become a critical “best practice” for..
Demystifying the Payment Card Industry – Data Security Standard Learn the 12 requirements for compliance with the PCI Data Security..
Why Cloud-Based Security and Archiving Make Sense Cloud computing is one of the most significant trends in IT today...
Why Some Things Shouldn't Go Viral Preventing breaches is only as effective as your employees' grip on their devices...
IPSec vs. SSL VPNs for Secure Remote Access Learn how Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec..
TriGeo Security Information Management in the Payment Card Industry: Using TriGeo SIM To Meet PCI Requirements Security Event and..
EMA Research: The Business Case for Striking an Optimal Balance of Endpoint Control Tips for determining ROI related to locking down PCs...
Keeping Your Laptop Users Up & Running How to address business continuity, information security, policy enforcement, and regulatory..
HIPAA and Beyond - How to Effectively Safeguard Electronic Protected Health Information Explore how to go beyond HIPAA by learning how to..
NAC: Managing Unauthorized Computers Learn how your enterprise can combat today's threats and still remain nimble enough for tomorrow's..
Get Started with GLBA and FFIEC Compliance How to build effective risk assessment processes in banks and credit unions...
Protection Starts with Security Management Solutions from NetIQ Enterprises are under constant attack from internal and external threats...
Security and Compliance in the Cloud Learn how to build a cloud-ready security program...
When Worlds Collide: Cloud Apps and Financial Services Learn how to use cloud access security brokers to overcome cloud security and..
Best Practices for Securing Your Enterprise Wireless Network Learn five best practices to secure enterprise networks from unauthorized use..
Sustainable Compliance - How to Reconnect Compliance, Security and Business Goals Learn strategic approaches to streamlining your compliance..
The 7 Things that IT Security Professionals MUST KNOW! Gain key insight into security problem and find the safest means to protect your..
5 Ways Your VMware and Hyper-V Backups May Fail You HA technology is fantastic and is great for protecting VMs in certain situations but it..
Protect your Business Now with Redefined Security for the Cloud Find out how to share your healthcare content in a HIPPA compliant manner...
The Holistic Approach to Targeted Attack Prevention Detect and monitor for cyber attacks...
Copyright © 2015 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to's Privacy Policy.
Resources: | FAQ | Legal Notices

Home | About | Help | Feedback | Updates

An initiative of Heriot-Watt University

Valid XHTML 1.0 Transitional