SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.


For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.


If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.

IT Security Ebooks

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."

Identity management

Identity management

Available solutions are challenged to detect and protect identity and authenticate users.

Online banking

Online banking

With massive DDoS attacks targeting specific accounts, online banking and other e-commerce activities are under seige.

Browser security

Browser security

The easiest way to compromise a corporate network is through a user running a browser application.

Network monitoring

Network monitoring

In the face of constant and insidious threats from organized companies and government agencies are often hard-pressed to know where to draw the line in the sand.

Compliance

Compliance

At a recent SC Magazine Rountable, information security and compliance professionals discussed how changes in technology are leading to an evolution in their roles.

Cloud security

Cloud security

More and more enterprises are embracing cloud computing, both through service agreements and private development, to gain greater efficiencies and better scalability in tough economic times.

Database security

Database security

The strong perimeter defenses that for years defined network security have, for the most part, become merely a small inconvenience to those determined enough to get in.