Telecommunications

Edge Computing in Telco Networks: Gaining the Competitive Edge
Earlier this year, Wind River® teamed up with F5, Schneider Electric, and Heavy Reading on a global...

Cybercrime tactics and techniques
2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to...

CISSP For Dummies
Secure your CISSP certification! If you're a security professional seeking your CISSP certification,...

Cyber Risk Commands C-suite's Focus: The State of Email Security 2023
As companies grow more skittish over rising economic volatility and intensifying geopolitical tensions,...

Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...

Linux All-In-One For Dummies, 6th Edition
Inside, over 500 pages of Linux topics are organized into eight task-oriented mini books that help you...

Cloud Security Challenges
The need for speed and agility in today's always-on, always-connected digital business has led IT teams...

Migrating to the Public Cloud: Three Success Stories
Organizations find the public cloud appealing for its promises of agility, reduced costs and developer-friendly...

Guidelines for an Effective Cybersecurity Incident Response Plan
Organizations with a cybersecurity incident response plan experience a lower average cost (by $2.46M)...

NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.