Linux
Use Case - Optimizing SIEM
Security Information and Event Management (SIEM) solutions form the core of many organizations' security...
Windows Server 2019 and PowerShell All-in-One For Dummies
Windows Server 2019 and PowerShell All-in-One For Dummies offers a single reference to help you build...
Improve Productivity with Box and Office 365
In this guide, discover why Box is the perfect complement to Office 365 — and all the other apps you...
High-performance persistent storage for virtualized workloads
Supporting virtualized workloads in Red Hat® OpenShift® requires reliable persistent storage that offers...
Aligning Cyber Skills To The MITRE ATTandCK Framework
The MITRE ATTandCK Framework is a comprehensive matrix of tactics and techniques used by threat hunters,...
Unified Fast File and Object (UFFO) Storage
In this book, you get an idea of the vast potential for unstructured data — and also the infrastructure...
The Survivor's Guide to Building an Office 365 Network
A Microsoft Office 365 deployment can be daunting. From a fast user experience, to a cost-cutting productivity...
OWASP Top 10
The nonprofit Open Web Application Security Project (OWASP) works to improve the security of software,...
Three reasons to manage Office 365 with Citrix Workspace
Are you considering migrating to Microsoft Office 365 or already facing challenges with the move? Don't...
Strengthening Critical Infrastructure Security
Advances to critical infrastructure technology is opening the door to threat actors and cyber attacks...
Linux Bible, 10th Edition
Linux Bible, 10th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.