• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

248
59
50
48
28

COUNTRY

47
9
7
5
5

CATEGORIES

  • 151
  • 57
  • 47
  • 35
  • 34
  • 33
  • 28
  • 27
  • 26
  • 26
  • 26
  • 21
  • 21
  • 20
  • 20
  • 18
  • 18
  • 18
  • 16
  • 15
  • 15
  • 14
  • 12
  • 12
  • 11
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
SHOW ALL…

PRICE

189
246
325
585

PUBLISHED

2
24
144
585

PRODUCT TYPE

421
145
15
4

Search "The Future of Privacy and IT Security" returned 585 results.

Privacy Law.

Privacy violations can occur at almost any level in an organization, with far-reaching consequences. Privacy Law thoroughly explains the legal obligations and potential liability of those who work with...

February 2015
FROM

Security and Privacy

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the...

March 2015

Enterprise Mobility: Wireless Carrier offerings Beyond MDM and BYOD Management

Enterprise Mobility has been one of the most important issues for corporate IT department for the last few years and is expected to continue to be a top priority Technology marches on while enterprise...

February 2014
FROM

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

April 2014
FROM

Telemedicine and E-Health Law.

The use of the Internet and high-tech communications in health care has led to new approaches to medical treatment-and to challenging legal questions. Telemedicine and E-Health Law has the answers that...

February 2015
FROM
The Mobile Device & Network Security Bible: 2013 - 2020 The Mobile Device & Network Security Bible: 2013 - 2020 - Product Thumbnail Image

The Mobile Device & Network Security Bible: 2013 - 2020

Mobile networks around the globe generate more than 50 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

September 2013
FROM

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

August 2014
FROM

Global Encryption Software Market (Usage, Vertical and Geography) - Size, Global Trends, Company Profiles, Segmentation and Forecast, 2013 - 2020

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of...

January 2015
FROM

Information Security Products and Services - Global Strategic Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware,...

July 2014
FROM

Wireless/Mobile Devices and OSS: Solutions and Market Opportunities

Wireless/Mobile Devices and OSS: Solutions and Market Opportunities is the most comprehensive research package available in the market focusing on wireless/mobile devices including OSS, User Interface...

December 2012
FROM

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

March 2015
FROM

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

August 2014
FROM

IP Video Surveillance and VSaaS Market (Technologies, Applications, Services, Geography) - Industry Analysis, Trends, Share, Opportunities and Forecast, 2012 - 2020

Increasing adoption of advance surveillance systems by the government sector and increased maintenance cost of existing surveillance system are major driving forces assisting in adoption of IP surveillance...

January 2014
FROM

Unmanned Aerial Systems Bundle 2015

The world’s unmanned systems markets, technologies and regulatory environments are evolving rapidly, creating opportunities in platforms, payloads, leasing, operations and maintenance. This bundle...

January 2015

Cloud Infrastructure Management: Companies and Solutions 2013

The cloud infrastructure ecosystem represents a large-scale distributed computing paradigm that is driven by economies of scale in which a pool of abstracted, virtualized, dynamically scalable, managed...

December 2013
FROM

Cyber Security Market by Solution - Global Forecast to 2020

'Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and...

June 2015
FROM

Becoming a Global Chief Security Executive Officer

Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader's ability to lead both today's, and tomorrow's, multidisciplined...

October 2015
Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015 Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015 - Product Thumbnail Image

Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015

Mobile phone biometric security is a strategic analysis of the market for mobile phone biometric security products and services This 200+ page report includes an investigation on current mobile phone...

June 2011
FROM

GPS Mobile Phones: the Privacy and Regulatory Issues

Annual shipments of GPS-enabled phones will grow rapidly over the period 2008-2012 The author predicts that by 2012, GPS phones will account for 37% of all shipments (535 million) The number of users...

February 2008
FROM

You: For Sale

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive...

September 2015
Loading Indicator

Our Clients

Hewlett-Packard Company Microsoft Corporation Philips N.V. SONY Corporation Cypress Semiconductor Corporation Panasonic Corporation