dummies

Results 1 - 25 of 313Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen Group     Published Date: Sep 11, 2012
This book helps put the private cloud model of computing into perspective for both businesses and technical leaders, providing valuable insight on how to make cloud computing an integral part of your business.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, private cloud, business
    
Aberdeen Group
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
This book helps put the private cloud model of computing into perspective for both businesses and technical leaders, providing valuable insight on how to make cloud computing an integral part of your business and more.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, private cloud, business
    
Aberdeen-IBM
Published By: Acronis EMEA     Published Date: May 18, 2015
This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.
Tags : 
backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
    
Acronis EMEA
Published By: Adobe     Published Date: Jan 25, 2018
Are you ready to tackle Business Process Management (BPM) for your enterprise? Do you want to improve efficiency, enhance agility, and also be more profitable? If so, you’re in the right place. BPM is an approach toward managing how an organization operates so it better meets the needs of clients. BPM enables organizations to be more efficient and more capable of change. BPM is exactly what your organization needs to meet the challenges of the modern business climate.
Tags : 
    
Adobe
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Reimburse employees same-day - Make sure expenses and invoices comply with policy - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Eliminate fraud and waste - Streamline process
Tags : 
    
AppZen
Published By: Aria Systems     Published Date: Sep 23, 2015
Learn to: Monetize and grow revenues by increasing customer acquisition, retention, and lifetime value Rething your business and billing service to take advantage of every revenue moment Better manage revenue operations across the enterprise
Tags : 
    
Aria Systems
Published By: Aria Systems     Published Date: May 03, 2016
Learn how to: - Monetize and grow revenues by increasing customer acquisition, retention - Rethink your business and billing service to take advantage of every revenue moment. - Better manage revenue operations across the enterprise.
Tags : 
    
Aria Systems
Published By: Ariba     Published Date: Oct 27, 2010
Run your business more efficiently, effectively, and at a lower cost!
Tags : 
ariba, collaborative commerce, cloud, shared infrastructure, procurement, sales and marketing
    
Ariba
Published By: Avaya     Published Date: Jan 20, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
    
Avaya
Published By: Avaya     Published Date: Jan 23, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
    
Avaya
Published By: Avaya     Published Date: Jan 28, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
    
Avaya
Published By: Avaya     Published Date: Feb 06, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
    
Avaya
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
    
Avi Networks
Published By: Blue Coat     Published Date: Nov 23, 2015
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances:
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : 
bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach
    
BMC
Published By: BMC ASEAN     Published Date: Jan 02, 2019
Bring security and operations together to protect your organization! Collaborative workflow processes that eliminate friction between security and operations teams sharply lower the risk of data breaches and operational downtime. Enterprises can advance their business agenda by minimizing communications breakdowns that leave the organization vulnerable to cyberattacks. This book shows you how!
Tags : 
    
BMC ASEAN
Published By: Brainshark     Published Date: Dec 08, 2015
Download this free eBook to get smarter about sales productivity. Whether you’re just getting started with sales enablement or already have a program underway, "Sales Enablement for Dummies" can help.
Tags : 
sales enablement, what is sales enablement, sales enablement strategies, sales force enablement, sales enablement research, sales enablement solutions
    
Brainshark
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center
    
CDW-Trend Micro
Published By: Cisco     Published Date: Sep 15, 2015
Are you trying to figure out exactly what software defined networking is and whether it should be part of your organization’s technology plans? If so, this book is designed to help.
Tags : 
iot, datacenter, sdn, enterprise, networking
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.