Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Our new telephony newsletter will deliver the latest in VoIP and IP communications information to your in-box every morning, Monday through Friday. Read more >>
Sponsored by Google Cloud computing may be new, but one thing hasn't changed: management's insistence on justifying IT investments by return on investment and total cost of ownership. You still weigh a solution's advantages/disadvantages and benefits/costs. This paper reviews four organizations who gained savings, productivity and innovation with Google Apps. Learn more. Download Now >>
RIM, Apple and newcomer ZTE break into the top 10 list of mobile phone sellers. Read more >>
Sean Michael Kerner Sean Michael Kerner From the 'Coming IPv4 Apocalypse' files:I've written my fair share of stories about how IPv4 address space is nearly exhausted and why IPv6 is necessary. At this point there is less than two years worth of IPv4 address space... Read more >>
No comments:
Post a Comment