Open Source
Microsoft Digital Defense Report
Over the past year the world has borne witness to a burgeoning cybercrime economy and the rapid rise...
VMware Cloud Workload Migration Tools
Before starting a cloud migration project, it is critical to understand the strategies and tools available...
Essential Operational Resilience
COVID-19's far-reaching impacts have thrashed many companies' Plan-A strategies, yet the pandemic offers...
NoSQL for Dummies
This easy to read guide to NoSQL databases provides the type of no–nonsense overview and analysis that...
What Makes Real Threat Intelligence
First popularized in terminology several years ago, threat intelligence means many things to many people....
Reinventing work in development teams
Software engineering teams were often among the best placed to adjust to 2020's shift to working from...
Next-Generation Anti-Malware Testing For Dummies
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your...
VMware Multi-Cloud Architecture - Enabling Choice & Flexibility
In today's world, application growth is unprecedented and enterprise applications on a wide range of...
2021 State of the Threat in review
The State of the Threat report is compiled by the world-renowned Secureworks® Counter Threat Unit™...
PHP, MySQL, and JavaScript All-in-One For Dummies
Get the basics on four key web programming tools in one great book! PHP, JavaScript, and HTML5 are essential...
Solving the Key Challenges in Mobile App Development Lifecycle
In a heavily fragmented mobile environment, developing applications compatible with multiple platforms...
Understanding Log Analytics at Scale
The humble machine log has been with us for many technology generations. The data that makes up these...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.