• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

1,503
1,240
1,227
1,152
1,106

COUNTRY

395
313
298
155
138

CATEGORIES

  • 6,230
  • 125
  • 71
  • 42
  • 40
  • 36
  • 31
  • 28
  • 26
  • 23
  • 22
  • 22
  • 21
  • 20
  • 20
  • 20
  • 18
  • 17
  • 15
  • 14
  • 11
  • 11
  • 11
  • 10
  • 10
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
SHOW ALL…

PRICE

6,165
6,439
6,468
6,816

PUBLISHED

12
48
210
6,816

PRODUCT TYPE

6,647
143
15
4
3
2
2

Search "Information Security. A Strategic Approach" returned 6,816 results.

Security and Data Privacy Integrated with Information Management: Informatica Takes a Strategic Approach

The impact and visibility of data breaches have given new meaning to the concept of "information" security Today more than ever before, data is at the center of efforts to secure sensitive information...

September 2012

Information Security. A Strategic Approach. Practitioners

Bridging the gap between information security and strategic planning This publication is a reflection of the author's firsthand experience as an information security consultant, working for an array...

May 2006

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

April 2014
FROM

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

March 2015
FROM

Cyber Security Market by Solution - Global Forecast to 2020

'Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and...

June 2015
FROM

Global Internet Security Market (Products & Services, Technology, Application and Geography) - Size, Share, Global Trends, Company Profiles, Analysis, Segmentation and Forecast, 2013 - 2020

The internet, in its essence has come a long way and has been constantly evolving in its approach to the consumers. The world, today, is inevitably attached to the internet with online networking. Organizations...

November 2014
FROM

Mobile Security Market by Solution & by Service - Global Forecast to 2019

Mobile Security Market by Solution (Mobile Identity Management, Mobile Data Protection, Mobile Device Management, Mobile VPN, MAM) & by Service (Implementation, Training & Support, Consulting, and Managed...

February 2015
FROM

The Manager's Handbook for Business Security. Edition No. 2

The Manager's Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs. This book is not an exhaustive textbook on the...

March 2014

Video Analytics Market by Type (Hardware, Video Analytics Software, and Services), Applications (Intrusion Management, Crowd Management, Situation Indication, License Plate Recognition, Pattern Recognition) - Global Forecast to 2020

The video analytics solutions are widely being adopted by businesses across a broad spectrum of end users, such as residential security, commercial & industrial security, urban security & public safety,...

June 2015
FROM

A Service-centric Approach to APTs

This research service focuses on the advanced persistent threats (APT) landscape in Europe, the Middle East, and Africa (EMEA) and the technologies that are offered by service providers that aim to...

June 2015
FROM

Industrial Security Systems Market by Systems, End Users, Component Service Geography - Global Forecasts to 2020

Industrial Security Systems Market by Systems (Video, RFID, Access Control, Intrusion Detection, Parking Management, Under Vehicle Inspection), End Users (SEZ, Factories, Hotels, Banks, Government),...

November 2014
FROM

Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based, Network Based, Wireless, On-premise & Cloud Deployment, Appliances, Software, Professional Services) - Global Advancements Forecasts & Analysis (2014-2019)

'Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based IDS/IPS, Network Based IDS/IPS, Wireless IDS/IPS, On-premise & Cloud Deployment, Appliances, Software, Professional...

April 2014
FROM
Quantum Cryptography - Global Strategic Business Report Quantum Cryptography - Global Strategic Business Report - Product Thumbnail Image

Quantum Cryptography - Global Strategic Business Report

This report analyzes the Global Market for Quantum Cryptography in US$ Million. Annual estimates and forecasts are provided for the period 2012 through 2020. Market data and analytics are derived...

March 2015
FROM

Asia Pacific Security Information Event Management (SIEM) Market CY 2010

This study covers the state of the Asia Pacific Security Information and Event Management, examining drivers and restraints for growth, distribution, technology, demand and geographical trends Following...

March 2011
FROM

Next Generation Biometrics Market by Application, Technology, Function & Geography - Global Forecast to 2020

Biometrics is the technology used for the purpose of authentication and verification. Biometrics measure and analyze both physiological and behavioral characteristics such as DNA, fingerprints, eye...

June 2015
FROM

Anti Counterfeit, Brand Protection & Tamper Evident Solutions – Supplier Industry Structure – Companies & Technologies 2013

Announcing a BRAND NEW techno-economic market report: Anti counterfeit, brand protection & tamper evident solutions – Supplier industry structure – Companies & technologies The publisher has visited...

November 2013

Strategic Intelligence Management

Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed...

March 2013
Biometrics for Banking and Financial Services - Global Strategic Business Report Biometrics for Banking and Financial Services - Global Strategic Business Report - Product Thumbnail Image

Biometrics for Banking and Financial Services - Global Strategic Business Report

This report analyzes the worldwide markets for Biometrics for Banking and Financial Services in US$ Million The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific,...

February 2014
FROM

Global Radiology Information Systems Market by Type, by Deployment Mode, by End User, by Component – Forecast to 2019

This report covers the definition, description, and forecast of the global radiology information systems (RIS) market. It involves detailed analysis of the market segmentation, which comprises different...

June 2015
FROM

Emerging Trends in ICT Security. Emerging Trends in Computer Science and Applied Computing

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis...

January 2014
Loading Indicator

Our Clients

Intel Corporation Autodesk, Inc. Hewlett-Packard Company Ahlstrom Corporation SAP SE 3M Company Samsung Group Ltd.