RANK | TITLE | PUBLISHER |
1 | E-Book: Technical Guide on Web Application Firewalls | SearchSecurity.com |
 |
2 | Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center | SearchSecurity.com |
 |
3 | Five Best Practices For Unified Communications | AT&T Corp |
 |
4 | Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud | IBM |
 |
5 | IBM Information On Demand Virtual 2010 | IBM |
 |
6 | The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs | Intel |
 |
7 | IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7 | Intel |
 |
8 | IBM Rational ROI Calculators and Value Estimators | IBM |
 |
9 | Three Steps for Creating a Mobility Strategy | AT&T Corp |
 |
10 | Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act | Information Security Magazine |
 |
11 | Storage Magazine: Nov - Dec 2010 | SearchStorage.com |
 |
12 | Cloud Computing for Developers | IBM |
 |
13 | Strategies for Solving the Datacenter Space, Power, and Cooling Crunch: Sun Server and Storage Optimization Techniques | Oracle Corporation |
 |
14 | E-Guide: Best of 2010: The 10 Web Pages Most Read by UK-based IT Pros | EMC Backup and Recovery Solutions |
 |
15 | E-Book: Data Warehousing Technology Trends | HP |
 |
16 | E-Book: Building Effective Dashboards and Scorecards | IBM |
 |
17 | Deploying Hyper-V Virtual Machines | AMD, Hewlett-Packard and Microsoft |
 |
18 | E-Book: CRM Trends and Tips for 2010 - Doing More With Less | IBM |
 |
19 | E-Book: Technical Guide on Application Security: Secure Development | IBM |
 |
20 | E-Book: NERC Compliance | SearchSecurity.com |
 |
21 | E-Guide: Application Lifecycle Management (ALM) | IBM |
 |
22 | E-Book: Technical Guide on Application Security: Scanning Production Applications | IBM |
 |
23 | E-Book: Predictive Analytics: The Next Big Thing in BI? | IBM |
 |
24 | Re-make or Re-model? A Cloud Computing E-Book, Chapter 2 | IBM |
 |
25 | Storage Magazine: October 2010 | SearchStorage.com |
 |
26 | Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor | Information Security Magazine |
 |
27 | Unified Networking on 10 Gigabit Ethernet | Intel |
 |
28 | E-Book: Top Data Integration Trends and Best Practices | IBM |
 |
29 | E-Book: Getting Started with Master Data Management (MDM) | IBM |
 |
30 | E-Guide: Best Practices for Developing Secure Applications | IBM |
 |
31 | E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA | IBM |
 |
32 | SoftwarePlanner QA Planner beta | SmartBear Software |
 |
33 | Storage Magazine June 2010: Solid State vs. Disk | SearchStorage.com |
 |
34 | Information Security Magazine – June 2010: Laptop Lockdown | Information Security Magazine |
 |
35 | First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies | ArcSight, an HP Company |
 |
36 | Establishing a Culture of Measurement - A Practical Guide to BI | Information Builders |
 |
37 | Implementing Database Security and Auditing: Using Granular Access Control | Guardium, an IBM Company |
 |
38 | Information Security Magazine: May 2010 - Data: Do you know where it’s going? | Information Security Magazine |
 |
39 | Smart Techniques for Application Security: Whitebox + Blackbox Security Testing | IBM |
 |
40 | Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms: Ubuntu Enterprise Cloud | Intel |
 |
41 | 11 Habits for Highly Successful BPM Programs: Proven Steps for Getting Started with Process Improvement | IBM |
 |
42 | E-Book: Technical Guide on Network Security Monitoring | AVG Technologies USA, Inc. |
 |
43 | The 101 Guide To The Cloud | Rackspace Hosting |
 |
44 | Storage Magazine: September 2010 | SearchStorage.com |
 |
45 | Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail | Information Builders |
 |
46 | Your September Issue of Information Security Magazine– Readers’ Choice Awards | Information Security Magazine |
 |
47 | How the Fastest Growing Companies Use Business Intelligence | Information Builders |
 |
48 | Information Security Magazine - February 2010: Under Control | Information Security Magazine |
 |
49 | Information Security Magazine - April 2010: Endpoints on the Loose | Information Security Magazine |
 |
50 | Desktop Virtualization: The Key for Securing Your Enterprise | Citrix |
No comments:
Post a Comment