RANK | TITLE | PUBLISHER |
1 | E-Book: Technical Guide on Web Application Firewalls | SearchSecurity.com |
|
2 | Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center | SearchSecurity.com |
|
3 | Five Best Practices For Unified Communications | AT&T Corp |
|
4 | Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud | IBM |
|
5 | IBM Information On Demand Virtual 2010 | IBM |
|
6 | The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs | Intel |
|
7 | IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7 | Intel |
|
8 | IBM Rational ROI Calculators and Value Estimators | IBM |
|
9 | Three Steps for Creating a Mobility Strategy | AT&T Corp |
|
10 | Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act | Information Security Magazine |
|
11 | Storage Magazine: Nov - Dec 2010 | SearchStorage.com |
|
12 | Cloud Computing for Developers | IBM |
|
13 | Strategies for Solving the Datacenter Space, Power, and Cooling Crunch: Sun Server and Storage Optimization Techniques | Oracle Corporation |
|
14 | E-Guide: Best of 2010: The 10 Web Pages Most Read by UK-based IT Pros | EMC Backup and Recovery Solutions |
|
15 | E-Book: Data Warehousing Technology Trends | HP |
|
16 | E-Book: Building Effective Dashboards and Scorecards | IBM |
|
17 | Deploying Hyper-V Virtual Machines | AMD, Hewlett-Packard and Microsoft |
|
18 | E-Book: CRM Trends and Tips for 2010 - Doing More With Less | IBM |
|
19 | E-Book: Technical Guide on Application Security: Secure Development | IBM |
|
20 | E-Book: NERC Compliance | SearchSecurity.com |
|
21 | E-Guide: Application Lifecycle Management (ALM) | IBM |
|
22 | E-Book: Technical Guide on Application Security: Scanning Production Applications | IBM |
|
23 | E-Book: Predictive Analytics: The Next Big Thing in BI? | IBM |
|
24 | Re-make or Re-model? A Cloud Computing E-Book, Chapter 2 | IBM |
|
25 | Storage Magazine: October 2010 | SearchStorage.com |
|
26 | Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor | Information Security Magazine |
|
27 | Unified Networking on 10 Gigabit Ethernet | Intel |
|
28 | E-Book: Top Data Integration Trends and Best Practices | IBM |
|
29 | E-Book: Getting Started with Master Data Management (MDM) | IBM |
|
30 | E-Guide: Best Practices for Developing Secure Applications | IBM |
|
31 | E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA | IBM |
|
32 | SoftwarePlanner QA Planner beta | SmartBear Software |
|
33 | Storage Magazine June 2010: Solid State vs. Disk | SearchStorage.com |
|
34 | Information Security Magazine – June 2010: Laptop Lockdown | Information Security Magazine |
|
35 | First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies | ArcSight, an HP Company |
|
36 | Establishing a Culture of Measurement - A Practical Guide to BI | Information Builders |
|
37 | Implementing Database Security and Auditing: Using Granular Access Control | Guardium, an IBM Company |
|
38 | Information Security Magazine: May 2010 - Data: Do you know where it’s going? | Information Security Magazine |
|
39 | Smart Techniques for Application Security: Whitebox + Blackbox Security Testing | IBM |
|
40 | Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms: Ubuntu Enterprise Cloud | Intel |
|
41 | 11 Habits for Highly Successful BPM Programs: Proven Steps for Getting Started with Process Improvement | IBM |
|
42 | E-Book: Technical Guide on Network Security Monitoring | AVG Technologies USA, Inc. |
|
43 | The 101 Guide To The Cloud | Rackspace Hosting |
|
44 | Storage Magazine: September 2010 | SearchStorage.com |
|
45 | Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail | Information Builders |
|
46 | Your September Issue of Information Security Magazine– Readers’ Choice Awards | Information Security Magazine |
|
47 | How the Fastest Growing Companies Use Business Intelligence | Information Builders |
|
48 | Information Security Magazine - February 2010: Under Control | Information Security Magazine |
|
49 | Information Security Magazine - April 2010: Endpoints on the Loose | Information Security Magazine |
|
50 | Desktop Virtualization: The Key for Securing Your Enterprise | Citrix |
No comments:
Post a Comment