0 CHECKOUT

PRODUCT FILTERS

REGION

255
60
51
49
29

COUNTRY

48
9
7
5
5

CATEGORIES

  • 92
  • 40
  • 35
  • 31
  • 28
  • 27
  • 22
  • 21
  • 19
  • 19
  • 19
  • 18
  • 16
  • 16
  • 15
  • 14
  • 13
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
SHOW ALL

PRICE

188
244
325
596

PUBLISHED

6
33
147
596

PRODUCT TYPE

433
143
15
4
1

Search for: "The Future of Privacy and IT Security"

596 Products

Privacy Law.

Privacy violations can occur at almost any level in an organization, with far-reaching consequences. Privacy Law thoroughly explains the legal obligations and potential liability of those who work with...

Published:  February 2015
Price:  From

Security and Privacy

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the...

Published:  March 2015
Price: 

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  April 2014
Price:  From

Enterprise Mobility: Wireless Carrier offerings Beyond MDM and BYOD Management

Enterprise Mobility has been one of the most important issues for corporate IT department for the last few years and is expected to continue to be a top priority Technology marches on while enterprise...

Published:  February 2014
Price:  From

The Mobile Device & Network Security Bible: 2013 - 2020

Mobile networks around the globe generate more than 50 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  September 2013
Price:  From
The Mobile Device & Network Security Bible: 2013 - 2020 The Mobile Device & Network Security Bible: 2013 - 2020 - Product Thumbnail Image

Telemedicine and E-Health Law.

The use of the Internet and high-tech communications in health care has led to new approaches to medical treatment-and to challenging legal questions. Telemedicine and E-Health Law has the answers that...

Published:  February 2015
Price:  From

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

Published:  August 2014
Price:  From

Information Security Products and Services - Global Strategic Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware,...

Published:  July 2014
Price:  From

Global Encryption Software Market (Usage, Vertical and Geography) - Size, Global Trends, Company Profiles, Segmentation and Forecast, 2013 - 2020

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of...

Published:  January 2015
Price:  From

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

Published:  March 2015
Price:  From

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

Published:  August 2014
Price:  From

IP Video Surveillance and VSaaS Market (Technologies, Applications, Services, Geography) - Industry Analysis, Trends, Share, Opportunities and Forecast, 2012 - 2020

Increasing adoption of advance surveillance systems by the government sector and increased maintenance cost of existing surveillance system are major driving forces assisting in adoption of IP surveillance...

Published:  January 2014
Price:  From

Cyber Security Market by Solution - Global Forecast to 2020

'Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and...

Published:  June 2015
Price:  From

Unmanned Aerial Systems Bundle 2015

The world’s unmanned systems markets, technologies and regulatory environments are evolving rapidly, creating opportunities in platforms, payloads, leasing, operations and maintenance. This bundle...

Published:  January 2015
Price: 

Cloud Infrastructure Management: Companies and Solutions 2013

The cloud infrastructure ecosystem represents a large-scale distributed computing paradigm that is driven by economies of scale in which a pool of abstracted, virtualized, dynamically scalable, managed...

Published:  December 2013
Price:  From

Becoming a Global Chief Security Executive Officer

Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader's ability to lead both today's, and tomorrow's, multidisciplined...

Published:  October 2015
Price: 

Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015

Mobile phone biometric security is a strategic analysis of the market for mobile phone biometric security products and services This 200+ page report includes an investigation on current mobile phone...

Published:  June 2011
Price:  From
Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015 Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015 - Product Thumbnail Image

Global Airport Passenger Screening Systems Market 2015-2019

About airport passenger screening systems Air passengers have to undergo strict security screening procedures before embarking an aircraft. In airports, passenger screening involves pat-down search...

Published:  August 2015
Price:  From

Network Security Market in India CY 2014

In the last few years, there have been organised security breaches in the Indian subcontinent that have caused data losses worth millions of dollars. Organisations in the region have started to realise...

Published:  July 2015
Price:  From

GPS Mobile Phones: the Privacy and Regulatory Issues

Annual shipments of GPS-enabled phones will grow rapidly over the period 2008-2012 The author predicts that by 2012, GPS phones will account for 37% of all shipments (535 million) The number of users...

Published:  February 2008
Price:  From
Loading Indicator

Our Clients

  • Ikea Systems B.V.
  • GlaxoSmithKline PLC
  • BT Group PLC.
  • Philips N.V.
  • BSH Home Appliances Ltd
  • Foreign & Commonwealth Office