| RANK | TITLE | PUBLISHER |
| 1 | E-Book: Technical Guide on Web Application Firewalls | SearchSecurity.com |
 |
| 2 | Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center | SearchSecurity.com |
 |
| 3 | Five Best Practices For Unified Communications | AT&T Corp |
 |
| 4 | Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud | IBM |
 |
| 5 | IBM Information On Demand Virtual 2010 | IBM |
 |
| 6 | The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs | Intel |
 |
| 7 | IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7 | Intel |
 |
| 8 | IBM Rational ROI Calculators and Value Estimators | IBM |
 |
| 9 | Three Steps for Creating a Mobility Strategy | AT&T Corp |
 |
| 10 | Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act | Information Security Magazine |
 |
| 11 | Storage Magazine: Nov - Dec 2010 | SearchStorage.com |
 |
| 12 | Cloud Computing for Developers | IBM |
 |
| 13 | Strategies for Solving the Datacenter Space, Power, and Cooling Crunch: Sun Server and Storage Optimization Techniques | Oracle Corporation |
 |
| 14 | E-Guide: Best of 2010: The 10 Web Pages Most Read by UK-based IT Pros | EMC Backup and Recovery Solutions |
 |
| 15 | E-Book: Data Warehousing Technology Trends | HP |
 |
| 16 | E-Book: Building Effective Dashboards and Scorecards | IBM |
 |
| 17 | Deploying Hyper-V Virtual Machines | AMD, Hewlett-Packard and Microsoft |
 |
| 18 | E-Book: CRM Trends and Tips for 2010 - Doing More With Less | IBM |
 |
| 19 | E-Book: Technical Guide on Application Security: Secure Development | IBM |
 |
| 20 | E-Book: NERC Compliance | SearchSecurity.com |
 |
| 21 | E-Guide: Application Lifecycle Management (ALM) | IBM |
 |
| 22 | E-Book: Technical Guide on Application Security: Scanning Production Applications | IBM |
 |
| 23 | E-Book: Predictive Analytics: The Next Big Thing in BI? | IBM |
 |
| 24 | Re-make or Re-model? A Cloud Computing E-Book, Chapter 2 | IBM |
 |
| 25 | Storage Magazine: October 2010 | SearchStorage.com |
 |
| 26 | Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor | Information Security Magazine |
 |
| 27 | Unified Networking on 10 Gigabit Ethernet | Intel |
 |
| 28 | E-Book: Top Data Integration Trends and Best Practices | IBM |
 |
| 29 | E-Book: Getting Started with Master Data Management (MDM) | IBM |
 |
| 30 | E-Guide: Best Practices for Developing Secure Applications | IBM |
 |
| 31 | E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA | IBM |
 |
| 32 | SoftwarePlanner QA Planner beta | SmartBear Software |
 |
| 33 | Storage Magazine June 2010: Solid State vs. Disk | SearchStorage.com |
 |
| 34 | Information Security Magazine – June 2010: Laptop Lockdown | Information Security Magazine |
 |
| 35 | First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies | ArcSight, an HP Company |
 |
| 36 | Establishing a Culture of Measurement - A Practical Guide to BI | Information Builders |
 |
| 37 | Implementing Database Security and Auditing: Using Granular Access Control | Guardium, an IBM Company |
 |
| 38 | Information Security Magazine: May 2010 - Data: Do you know where it’s going? | Information Security Magazine |
 |
| 39 | Smart Techniques for Application Security: Whitebox + Blackbox Security Testing | IBM |
 |
| 40 | Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms: Ubuntu Enterprise Cloud | Intel |
 |
| 41 | 11 Habits for Highly Successful BPM Programs: Proven Steps for Getting Started with Process Improvement | IBM |
 |
| 42 | E-Book: Technical Guide on Network Security Monitoring | AVG Technologies USA, Inc. |
 |
| 43 | The 101 Guide To The Cloud | Rackspace Hosting |
 |
| 44 | Storage Magazine: September 2010 | SearchStorage.com |
 |
| 45 | Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail | Information Builders |
 |
| 46 | Your September Issue of Information Security Magazine– Readers’ Choice Awards | Information Security Magazine |
 |
| 47 | How the Fastest Growing Companies Use Business Intelligence | Information Builders |
 |
| 48 | Information Security Magazine - February 2010: Under Control | Information Security Magazine |
 |
| 49 | Information Security Magazine - April 2010: Endpoints on the Loose | Information Security Magazine |
 |
| 50 | Desktop Virtualization: The Key for Securing Your Enterprise | Citrix |
No comments:
Post a Comment