dcsimg
 

IT Downloads Results for Type : Research

All
All
 
 
Showing 1-10 of 91 Results    
 
 
email9

Trustworthy Email

  ITDownload  
  |   RESEARCH   |   Sep 22, 2016
 

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

...  More >>

 
Analytics16

Network of 'Things'

  ITDownload  
  |   RESEARCH   |   Aug 17, 2016
 

This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation.

...  More >>

 
Mobile41

Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

  ITDownload  
  |   RESEARCH   |   Dec 03, 2014
 

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.

...  More >>

 
Misc43

Guidelines for Smart Grid Cybersecurity

  ITDownload  
  |   RESEARCH   |   Oct 06, 2014
 

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities.

...  More >>

 

Approximate Matching: Definition and Terminology

  ITDownload  
  |   RESEARCH   |   Jul 10, 2014
 

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

...  More >>

 
cloud20

Protection Options for Virtualized Infrastructures in IaaS Cloud

  ITDownload  
  |   RESEARCH   |   Jun 24, 2014
 

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

...  More >>

 

Electronic Authentication Guidelines

  ITDownload  
  |   RESEARCH   |   Sep 04, 2013
 

Learn more about advanced techniques for user authentication to sensitive computer systems.

...  More >>

 
Eleven Reasons IT Projects Fail

Eleven Reasons IT Projects Fail

  ITDownload  
  |   RESEARCH   |   Feb 27, 2012
 

IT Business Edge compiled this list of early warning signs to help yourecognize and address project problems before catastrophic failure occurs....  More >>

 
Security Information Event Management Landscape Presentation

Security Information Event Management Landscape Presentation

  ITDownload  
  |   RESEARCH   |   Oct 19, 2011
 

This 58-page presentation gives a high-level overview of the space and ranks key vendors and solutions.

...  More >>

 
Knowledge Warehouse Business Case Sample

Knowledge Warehouse Business Case Sample

  ITDownload  
  |   RESEARCH   |   Sep 28, 2011
 

This extensive document can be used as a template or simply as a reference for the kinds of analysis that's required to justify a large project....  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.