IT Downloads Results for Type : Research

All
All
 
 
Showing 1-10 of 91 Results    
 
 
email9

Trustworthy Email

  ITDownload  
  |   RESEARCH   |   Sep 22, 2016
 

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

...  More >>

 
Analytics16

Network of 'Things'

  ITDownload  
  |   RESEARCH   |   Aug 17, 2016
 

This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation.

...  More >>

 
Mobile41

Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

  ITDownload  
  |   RESEARCH   |   Dec 03, 2014
 

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.

...  More >>

 
Misc43

Guidelines for Smart Grid Cybersecurity

  ITDownload  
  |   RESEARCH   |   Oct 06, 2014
 

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities.

...  More >>

 

Approximate Matching: Definition and Terminology

  ITDownload  
  |   RESEARCH   |   Jul 10, 2014
 

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

...  More >>

 
cloud20

Protection Options for Virtualized Infrastructures in IaaS Cloud

  ITDownload  
  |   RESEARCH   |   Jun 24, 2014
 

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

...  More >>

 

Electronic Authentication Guidelines

  ITDownload  
  |   RESEARCH   |   Sep 04, 2013
 

Learn more about advanced techniques for user authentication to sensitive computer systems.

...  More >>

 
Eleven Reasons IT Projects Fail

Eleven Reasons IT Projects Fail

  ITDownload  
  |   RESEARCH   |   Feb 27, 2012
 

IT Business Edge compiled this list of early warning signs to help yourecognize and address project problems before catastrophic failure occurs....  More >>

 
Security Information Event Management Landscape Presentation

Security Information Event Management Landscape Presentation

  ITDownload  
  |   RESEARCH   |   Oct 19, 2011
 

This 58-page presentation gives a high-level overview of the space and ranks key vendors and solutions.

...  More >>

 
Knowledge Warehouse Business Case Sample

Knowledge Warehouse Business Case Sample

  ITDownload  
  |   RESEARCH   |   Sep 28, 2011
 

This extensive document can be used as a template or simply as a reference for the kinds of analysis that's required to justify a large project....  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.