Display search results for ** instead (129 products)
02 Jan 2015  |  Global
Network Security Technology Alert. Securing Defense Information from Cyber Attacks; Visualization-Based Security for Cloud Transactions; Non-Intrusive Firewall for Directory Services
This issue profiles securing defense information from cyber attacks, visualization-based security for cloud transactions, and a non-intrusive firewall for directory services.
16 Jan 2015  |  Global
IT; Computing and Communications Technology Alert. Data Visualization in Healthcare; ; Novel Development Framework for Hybrid Applications; Business Analytics Software for Sales Success
This issue profiles data visualization in healthcare, a novel development framework for hybrid applications, and business analytics software for sales success.
06 Feb 2015  |  Global
Network Security Technology Alert. Cloud-Based DDoS Protection; Cost-Efficient Next Generation Firewall; Endpoint Data Protection for BYOD
This issue profiles cloud-based DDoS protection, a cost-efficient next generation firewall, and endpoint data protection for BYOD.
20 Feb 2015  |  Global
IT; Computing and Communications Technology Alert. Context Awareness Enables Intelligent Sales Management Systems; Personalization for Customer Retention Platforms; Dimensions of Social Media Analytics
This issue profiles context awareness that enables intelligent sales management systems, personalization for customer retention platforms, and dimensions of social media analytics.
06 Mar 2015  |  Global
Network Security Technology Alert. Securing the banking and financial sectors from cyber attacks; dimensions of security-as-a-service; technologies fueling the development of futuristic intelligent security
This issue profiles securing the banking and financial sectors from cyber attacks; dimensions of security-as-a-service; technologies fueling the development of futuristic intelligent security
20 Mar 2015  |  Global
IT; Computing and Communications Technology Alert. Dimensions of LTE-A; Location-Based Services are Transforming the Retail Sector; Semantic Search Techniques Enable Contextual Search Engines
This issue profiles dimensions of LTE-A, location-based services that are transforming the retail sector, and semantic search techniques that enable contextual search engines.
03 Apr 2015  |  Global
Network Security Technology Alert. Dimensions of Data Loss Prevention; Adaptive Access Control Management System; Automated Security for Virtualized Data Centers
This issue profiles dimensions of data loss prevention, an adaptive access control management system, and automated security for virtualized data centers.
17 Apr 2015  |  Global
IT; Computing and Communications Technology Alert. Wireless Mobile Communication Acts as a Data Carrier for Augmented Reality; Dimensions of Enterprise Mobility Management; Mobile Styluses as Fashion Accessories
This issue profiles wireless mobile communication that acts as a data carrier for augmented reality, dimensions of enterprise mobility management, and mobile styluses that doule up as fashion accessories.
17 Apr 2015  |  Global
This issue profiles software-defined everything that is considered as the future of organizational infrastructure.
USD 562.50 save 25 %
01 May 2015  |  Global
Network Security Technology Alert. Dimensions of Big Data Security; Reducing Costs Associated with Exploit Mitigation; Artificial Intelligence-Based BYOD Security
This issue profiles dimensions of big data security, reducing costs associated with exploit mitigation, and artificial intelligence-based BYOD security.