Operating Systems
Python All-In-One For Dummies
Your one-stop resource on all things Python! Thanks to its flexibility, Python has grown to become one...
Security Control Guide: Hardened Services Guide
System Hardening is the process of securing a system's configuration and settings to reduce IT vulnerability...
The Business Value of Red Hat Enterprise Linux
Linux has firmly established itself as a preferred delivery vehicle for modern applications, in addition...
Cyberthreats: A 20-Year Retrospective
Annual threat reports provide an opportunity to look back at significant events of the past 12 months...
2022 State of the Threat: A Year in Review
In 2022, ransomware remained the most prevalent form of attack. In investigations by Secureworks® incident...
Four Ransomware Resiliency Challenges You Can Combat with Confidence
Ransomware is a growing thread to operational resiliency in all digital enterprises. These four stories...
CompTIA A+ Certification All-in-One For Dummies, 5th Edition
Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification...
Artificial Intelligence: The Smarter Approach To Information Security
The news headlines are replete with stories of devastating data breaches, compromising the personal and...
Increase Your Productivity with DocuSign for Office 365
Microsoft has teamed up with DocuSign to make our industry-leading eSignature apps available to businesses...
Infrastructure Monitoring 101
For any sized company, the rapidly expanding implementation of today's technology creates unique and...
The CISO’s Guide to Effective Zero-trust Access
Best practices in network access stipulate a zero-trust access (ZTA) approach. CISOs looking to implement...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.