Get RSS Updates!

Government

Browse through our extensive list of free Government magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

20 Practical Tips on Authentication and Access Management This white paper for Financial and Government IT Professionals provides peer..
The CIO's BYOD Toolbox: Top Trends for HIPAA Compliant mHealth We are all connected. And these connections, which now often merge the..
Top Trending Government Technology Resources for Spring 2015 Download this kit to learn everything you need to know about Government..
New Cyber Security Federal Regulations: How This Is Impacting Application Network Radware and IDG Research Services conducted a survey to..
Building a Smarter IT Infrastructure for Local Government Learn how to deliver fast and available online government services with greater..
SMART CITIES NEWS Is the global news source for advances in M2M innovations in infrastructure...
Fierce Government IT Is a free, three times a week email briefing for government employees and contractors on the latest government..
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure. A must read for individuals in Government and Education...
The Future of Drones: Sky-High Hopes vs. Regulatory Realities The tech giants are thought to be using their fleets of high-altitude,..
Building a More Efficient Government with eSignatures Reengineering processes with eSignature technologies better serves public needs...
SMART BUILDING & CONSTRUCTION NEWS Is the global news source for advances in M2M innovations in energy efficiency and maintenance...
ESIGN Act: A Well-Established Law Enabling Business Transformation Today This legislation is a guide to electronic signatures in the U.S...
CONNECTED INDUSTRIES NEWS Global news about connected technology for manufacturing, assembly, and agriculture...
Military & Aerospace Electronics Is published exclusively for engineering managers and engineers involved with military and aerospace..
10 Steps to Consider when Moving to Multi-Space Parking This white paper reviews key considerations for creating a parking program that fits..
Killer Robots: Natural Evolution, or Abomination? In terms of assessing a battlefield scene, no technology surpasses the ability of the..
Federal Computer Week Focuses on the business value of technology in government...
Fierce Homeland Security Tracks the latest news and developments in domestic national security...
Sharing & Layering of Data in Cyber Investigations Learn the policies and best practices government agencies and financial institutions can..
Real-Time Mission-Critical Information and Law Enforcement Mobility: Making Things Work When Failure Is Not an Option Learn how Fujitsu and..
Top 7 Considerations for Achieving CJIS Compliance This white paper explains what every government organizations needs to know to comply..
Revinetix backup and recovery solutions make protecting city data simple and affordable for Overland Park, Kansas Learn how Overland Park,..
Knowledge Retention for Acquisition Professionals Discover the technology, methodologies, and training to insure the new acquisition..
Integrated Maintenance - A Logistics Solution for Defense Keep equipment operating at peak performance: online solution delivers maintenance..
Doctorate in Law & Policy: Real Impact, Real Results Decide today to obtain the knowledge, skills, and credentials to take your career to..
Protecting Federal Systems from Advanced Persistent Threats In today's multilayered attacks against government systems, one of the key entry..
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
Laws, Regulations and Compliance: Top Tips for Keeping your Data Under your Control Learn how with the right combination of policies,..
Fixing Your Dropbox Problem How the right data protection strategy can help...
Drone Wars: How UAV Tech Is Transforming the Future of War By downloading this free guide, you agree to receive regular updates on the..
Effective Corporate E-Mail Compliance Informative overview of current regulations and how implementing a policy-based messaging security..
Lost Customer Information: What Does a Data Breach Cost Companies? Organizations lose confidential customer information more frequently than..
The GAO Cost Guide and Compliance – Controlling Costs and Risk Government Program Managers need to assess their cost estimating and..
The End of An Era: Evolving Beyond Email and Spreadsheets to Manage Your Law Department The continued and intense pressure to “do more..
Improving Federal Information Access Security with FIPS-Certified Solutions Network security incidents within the U.S. federal government..
A New Approach to Contract Management Learn how utilizing an App-centric approach can streamline contract review and approval in your legal..
ThinkPad Tablet Management Want to make it easy for users to be productive with their tablets right away?..
Strategic Solutions for Government IT The U.S. government is transforming its IT strategy to streamline operations and smooth the transition..
Optimize E-Discovery with Kazeon Identifying, searching and managing electronic information is expensive and risks legal exposure. Learn to..
Fierce Mobile Government Tracks developments in federal, state and local governments' efforts to adopt consumer mobile technology in both..
Legal Aspects of Incident Investigation Explore the world of legality and how to avoid serious errors that impairs an organization's ability..
FierceGovernment Reports on the people, technology and processes that are making government more collaborative, transparent and efficient...
Best Practices for Host-Based Intrusion (HIPS) Find out about the demand for host intrusion prevention systems, what evaluation criteria to..
The Federal Case for Application Delivery Networks Learn why visibility, acceleration, and security are essential to contain costs and..
Complying with Financial Services Regulations Through Information Availability Learn how protecting the increasingly complex and vital IT..
Navigating the Voluntary Disclosure Process Learn why a proactive approach can minimize inevitable costs...
Four Data Threats in a Post-PC World Managing BYOD, mobile devices, cloud storage and social networks...
Managed Print Services for Government and Education The Government and Education industry finds taking control of their in-house printed..
Consolidation with HP Multifunction Printers Saves Money, Time for State The policy of keeping old printers was supposed to save money...
A More Secure Front Door -- SSO and Strong Authentication This white paper helps Financial and Government IT Professionals answer all the..
Closing the Back Door on Network Application Vulnerabilities Web server protection and security strategy for individuals within the..
Going 'Hands On' At the US Army Virtual Reality Game Studio By downloading this free guide, you agree to receive regular updates on the..
   


Copyright © 2015 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices