Linux

CISSP For Dummies
Secure your CISSP certification! If you're a security professional seeking your CISSP certification,...

Top 5 Ways to Simplify Data Protection with Microsoft Azure
Read this white paper to find out five ways that you can simplify data protection with Microsoft Azure,...

PHP, MySQL, and JavaScript All-in-One For Dummies
Get the basics on four key web programming tools in one great book! PHP, JavaScript, and HTML5 are essential...

Microsoft Digital Defense Report
Over the past year the world has borne witness to a burgeoning cybercrime economy and the rapid rise...

Ransomware Protection with Veritas NetBackup Appliances
Download this whitepaper to discover how to protect your backup and recovery infrastructure from attacks....

Using MITRE ATT&CKâ„¢ in Threat Hunting and Detection
MITRE ATT&CK â„¢ is an open framework and knowledge base of adversary tactics and techniques based on...

Segmentation That Isn't Hard
Segmentation is a concept that has been around as long as we've been connecting networks. It is a proven...

The Survivor's Guide to Building an Office 365 Network
A Microsoft Office 365 deployment can be daunting. From a fast user experience, to a cost-cutting productivity...

IT's 5 Toughest Work from Home Challenges
All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was...

Long-Term Data Retention with Veritas NetBackup
This white paper provides a technical overview of cloud storage as a long-term retention storage solution...

Lacework 2021 Cloud Threat Report, Volume 1
The Lacework Labs team provides quarterly reports focused on risks and threats relevant to cloud services,...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.