SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.


For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.


If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.

IT Security Ebooks

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

2013 eBook on Advanced Persistent Threats

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in the world.

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."

Identity management

Identity management

Available solutions are challenged to detect and protect identity and authenticate users.

Online banking

Online banking

With massive DDoS attacks targeting specific accounts, online banking and other e-commerce activities are under seige.

Browser security

Browser security

The easiest way to compromise a corporate network is through a user running a browser application.

Network monitoring

Network monitoring

In the face of constant and insidious threats from organized companies and government agencies are often hard-pressed to know where to draw the line in the sand.