0 CHECKOUT

PRODUCT FILTERS

REGION

294
63
54
52
31

COUNTRY

51
13
10
6
6

CATEGORIES

  • 47
  • 39
  • 38
  • 36
  • 32
  • 29
  • 28
  • 27
  • 26
  • 24
  • 18
  • 16
  • 16
  • 14
  • 14
  • 14
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
SHOW ALL

PRICE

189
244
314
640

PUBLISHED

10
29
173
640

PRODUCT TYPE

468
150
15
4
2
1

Search for: "The Future of Privacy and IT Security"

Privacy Law.

Privacy violations can occur at almost any level in an organization, with far-reaching consequences. Privacy Law thoroughly explains the legal obligations and potential liability of those who work with...

Published:  February 2015
Price:  From

Security and Privacy

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the...

Published:  March 2015
Price: 

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  April 2014
Price:  From

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

Published:  August 2014
Price:  From

Enterprise Mobility: Wireless Carrier offerings Beyond MDM and BYOD Management

Enterprise Mobility has been one of the most important issues for corporate IT department for the last few years and is expected to continue to be a top priority Technology marches on while enterprise...

Published:  February 2014
Price:  From

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

Published:  March 2015
Price:  From

Health IT Security Market Products and Services, Services, Application, Delivery Mode, End User - Global Forecast to 2020

Health IT Security Market Products and Services (Products (Antivirus, IAM, DLP), Services (Consulting, MSS)), Application (Network Security, Endpoint Security), Delivery Mode (On-premise, On-demand),...

Published:  December 2015
Price:  From

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

Published:  August 2014
Price:  From

Telemedicine and E-Health Law.

The use of the Internet and high-tech communications in health care has led to new approaches to medical treatment-and to challenging legal questions. Telemedicine and E-Health Law has the answers that...

Published:  February 2015
Price:  From

The Mobile Device & Network Security Bible: 2013 - 2020

Mobile networks around the globe generate more than 50 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  September 2013
Price:  From

Cyber Security Market by Solution - Global Forecast to 2020

'Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and...

Published:  June 2015
Price:  From

IP Video Surveillance and VSaaS Market (Technologies, Applications, Services, Geography) - Industry Analysis, Trends, Share, Opportunities and Forecast, 2012 - 2020

Increasing adoption of advance surveillance systems by the government sector and increased maintenance cost of existing surveillance system are major driving forces assisting in adoption of IP surveillance...

Published:  January 2014
Price:  From

Home Security Solutions Market (By Component - Hardware, Software, Services) - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2015 - 2022

The Home Security Solutions Market report provides an analysis of the global home security solution market for the period 2013–2022, wherein the period from 2015 to 2022 comprises the forecast period...

Published:  November 2015
Price:  From

Unmanned Aerial Systems Bundle 2015

The world’s unmanned systems markets, technologies and regulatory environments are evolving rapidly, creating opportunities in platforms, payloads, leasing, operations and maintenance. This bundle...

Published:  January 2015
Price: 

Cloud Infrastructure Management: Companies and Solutions 2013

The cloud infrastructure ecosystem represents a large-scale distributed computing paradigm that is driven by economies of scale in which a pool of abstracted, virtualized, dynamically scalable, managed...

Published:  December 2013
Price:  From

Data Center Security: Global Market Research Report 2015-2019

About data center security A data center being the backbone of enterprise business operations, requires the highest level of security. Data center security solutions safeguard confidential data against...

Published:  October 2015
Price:  From

Becoming a Global Chief Security Executive Officer

Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader's ability to lead both today's, and tomorrow's, multidisciplined...

Published:  October 2015
Price: 

Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015

Mobile phone biometric security is a strategic analysis of the market for mobile phone biometric security products and services This 200+ page report includes an investigation on current mobile phone...

Published:  June 2011
Price:  From

Information Security Products and Services - Global Strategic Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware,...

Published:  July 2014
Price:  From

Global Data Center Security Market By Physical Security Solutions,Logical Security Solutions, Size of Datacenter, Components, Environment, Industry Verticals, Regions and Vendors (2015-2020)

Increase in data traffic, rise in cyber threats and growth of virtualized data centers has led to robust demand for Data Center Security solutions with its market estimated to reach $13.38 billion by...

Published:  September 2015
Price:  From
Loading Indicator

Our Clients

  • Amneal Pharmaceuticals LLC.
  • Amgen Inc.
  • LEO Laboratories Ltd.
  • Pfizer Inc.
  • Roche Diagnostics Ltd.
  • Merck & Co., Inc.
  • Sanofi S.A.