Get RSS Updates!

Government

Browse through our extensive list of free Government magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Government Web Security and the OWASP Top 10: The Big Picture OWASP Top 10 “The Big Picture” is all about understanding the top..
Gain Situational Awareness Needed To Mitigate Cyberthreats How Can Your Organization's Data Help Improve Cyber Security? Read the report to..
Sharing & Layering of Data in Cyber Investigations Learn the policies and best practices government agencies and financial institutions can..
New Cyber Security Federal Regulations: How This Is Impacting Application Network Radware and IDG Research Services conducted a survey to..
Top Trending Government Technology Resources for Spring 2015 Download this kit to learn everything you need to know about Government..
CONNECTED INDUSTRIES NEWS Global news about connected technology for manufacturing, assembly, and agriculture...
SMART BUILDING & CONSTRUCTION NEWS Is the global news source for advances in M2M innovations in energy efficiency and maintenance...
Knowledge Retention for Acquisition Professionals Discover the technology, methodologies, and training to insure the new acquisition..
SMART CITIES NEWS Is the global news source for advances in M2M innovations in infrastructure...
The End of An Era: Evolving Beyond Email and Spreadsheets to Manage Your Law Department The continued and intense pressure to “do more..
Military & Aerospace Electronics Is published exclusively for engineering managers and engineers involved with military and aerospace..
Killer Robots: Natural Evolution, or Abomination? In terms of assessing a battlefield scene, no technology surpasses the ability of the..
Laws, Regulations and Compliance: Top Tips for Keeping your Data Under your Control Learn how with the right combination of policies,..
Going 'Hands On' At the US Army Virtual Reality Game Studio By downloading this free guide, you agree to receive regular updates on the..
Fierce Homeland Security Tracks the latest news and developments in domestic national security...
Federal Computer Week Focuses on the business value of technology in government...
Real-Time Mission-Critical Information and Law Enforcement Mobility: Making Things Work When Failure Is Not an Option Learn how Fujitsu and..
Revinetix backup and recovery solutions make protecting city data simple and affordable for Overland Park, Kansas Learn how Overland Park,..
Integrated Maintenance - A Logistics Solution for Defense Keep equipment operating at peak performance: online solution delivers maintenance..
Integrating Compliance with Business Strategy Learn the five levels of the Compliance Maturity Model..
Doctorate in Law & Policy: Real Impact, Real Results Decide today to obtain the knowledge, skills, and credentials to take your career to..
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
Meet & Manage Government Mandates For Your Fleet Optimization Goals Solve today's tough fleet management challenges and do more with less...
Big Data for Government Drives Improvements in Cybersecurity and Service Delivery Learn steps to developing a proactive strategy to improve..
Fixing Your Dropbox Problem How the right data protection strategy can help...
Drone Wars: How UAV Tech Is Transforming the Future of War By downloading this free guide, you agree to receive regular updates on the..
Why You Need Improved Operational Intelligence for Big Data Learn how to turn your Machine Data, the Critical Big Data into Valuable..
Fierce Government IT Is a free, three times a week email briefing for government employees and contractors on the latest government..
Effective Corporate E-Mail Compliance Informative overview of current regulations and how implementing a policy-based messaging security..
Lost Customer Information: What Does a Data Breach Cost Companies? Organizations lose confidential customer information more frequently than..
The GAO Cost Guide and Compliance – Controlling Costs and Risk Government Program Managers need to assess their cost estimating and..
10 Steps to Consider when Moving to Multi-Space Parking This white paper reviews key considerations for creating a parking program that fits..
Does your code of conduct program hit the mark? Ten questions you should be asking yourself...
HIPAA Compliance, PHI and BYOD Learn the best way for IT professionals in the Medical/Healthcare industry to secure employees' personal..
A New Approach to Contract Management Learn how utilizing an App-centric approach can streamline contract review and approval in your legal..
ESIGN Act: A Well-Established Law Enabling Business Transformation Today This legislation is a guide to electronic signatures in the U.S...
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure. A must read for individuals in Government and Education...
ThinkPad Tablet Management Want to make it easy for users to be productive with their tablets right away?..
Optimize E-Discovery with Kazeon Identifying, searching and managing electronic information is expensive and risks legal exposure. Learn to..
Fierce Mobile Government Tracks developments in federal, state and local governments' efforts to adopt consumer mobile technology in both..
Legal Aspects of Incident Investigation Explore the world of legality and how to avoid serious errors that impairs an organization's ability..
FierceGovernment Reports on the people, technology and processes that are making government more collaborative, transparent and efficient...
Security and HIPAA Compliance: Meeting the Challenge of Securing Protected Health Information Providing greater risk visibility, NetIQ..
Best Practices for Host-Based Intrusion (HIPS) Find out about the demand for host intrusion prevention systems, what evaluation criteria to..
The Federal Case for Application Delivery Networks Learn why visibility, acceleration, and security are essential to contain costs and..
Complying with Financial Services Regulations Through Information Availability Learn how protecting the increasingly complex and vital IT..
Navigating the Voluntary Disclosure Process Learn why a proactive approach can minimize inevitable costs...
Four Data Threats in a Post-PC World Managing BYOD, mobile devices, cloud storage and social networks...
Managed Print Services for Government and Education The Government and Education industry finds taking control of their in-house printed..
Consolidation with HP Multifunction Printers Saves Money, Time for State The policy of keeping old printers was supposed to save money...
The Future of Drones: Sky-High Hopes vs. Regulatory Realities The tech giants are thought to be using their fleets of high-altitude,..
Closing the Back Door on Network Application Vulnerabilities Web server protection and security strategy for individuals within the..
   


Copyright © 2015 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices