Microsoft Office
Real-world SLAs and Availability Requirements
Data protection technologies and processes are effective only when you establish clear objectives, then...
Simply SQL 2017, Teach Yourself SQL
SQL is the language used by all major database systems today. SQL has been around for about 30 years,...
Transforming the way Businesses Consume Technology
Technology has never been easier to pay for, manage and support. The way products and services are consumed...
2022 State of the Threat: A Year in Review
In 2022, ransomware remained the most prevalent form of attack. In investigations by Secureworks® incident...
Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...
Reduce the cost of running windows workloads by migrating to AWS
Optimise Windows Server, modernise .Net applications and decrease SQL Server licensing costs. Download...
Linux All-In-One For Dummies, 6th Edition
Inside, over 500 pages of Linux topics are organized into eight task-oriented mini books that help you...
Cyber Attack Trends: Check Point’s 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...
Don't pay the ransom
In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you...
Ransomware Prevention Is Possible
Ransomware is a form of malware that encrypts files to prevent victims from accessing their systems and...
Microsoft Teams Backup - a Conversational Geek E-book
Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.