Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Government

Browse through our extensive list of free Government white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

New Cyber Security Federal Regulations: How This Is Impacting Application Network Radware and IDG Research Services conducted a survey to..
Killer Robots: Natural Evolution, or Abomination? In terms of assessing a battlefield scene, no technology surpasses the ability of the..
The Essentials of Government Technology - Free Kit Download this kit to learn everything you need to know about Government Technology...
Sharing & Layering of Data in Cyber Investigations Learn the policies and best practices government agencies and financial institutions can..
Drone Wars: How UAV Tech Is Transforming the Future of War By downloading this free guide, you agree to receive regular updates on the..
Managed Print Services for Government and Education The Government and Education industry finds taking control of their in-house printed..
Real-Time Mission-Critical Information and Law Enforcement Mobility: Making Things Work When Failure Is Not an Option Learn how Fujitsu and..
Revinetix backup and recovery solutions make protecting city data simple and affordable for Overland Park, Kansas Learn how Overland Park,..
Knowledge Retention for Acquisition Professionals Discover the technology, methodologies, and training to insure the new acquisition..
Integrated Maintenance - A Logistics Solution for Defense Keep equipment operating at peak performance: online solution delivers maintenance..
Doctorate in Law & Policy: Real Impact, Real Results Decide today to obtain the knowledge, skills, and credentials to take your career to..
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
CISO Guide to Next Generation Threats Learn how to combat advanced malware, zero-day and targeted APT attacks...
Laws, Regulations and Compliance: Top Tips for Keeping your Data Under your Control Learn how with the right combination of policies,..
Fixing Your Dropbox Problem How the right data protection strategy can help...
Effective Corporate E-Mail Compliance Informative overview of current regulations and how implementing a policy-based messaging security..
Lost Customer Information: What Does a Data Breach Cost Companies? Organizations lose confidential customer information more frequently than..
The GAO Cost Guide and Compliance – Controlling Costs and Risk Government Program Managers need to assess their cost estimating and..
10 Steps to Consider when Moving to Multi-Space Parking This white paper reviews key considerations for creating a parking program that fits..
Data Breach Notification Laws: The Need for Spyware Detection Capability Much has been written about the pressing need for today's..
The End of An Era: Evolving Beyond Email and Spreadsheets to Manage Your Law Department The continued and intense pressure to “do more..
How Can an automated Program Office Solution Help My Agency Meet its Performance and Reporting Goals? This white paper will provide guidance..
A New Approach to Contract Management Learn how utilizing an App-centric approach can streamline contract review and approval in your legal..
Earned Value Management Solution for Federal Agencies from Microsoft Learn how a Microsoft-based EVM solution enables organizations to..
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure. A must read for individuals in Government and Education...
ThinkPad Tablet Management Want to make it easy for users to be productive with their tablets right away?..
Optimize E-Discovery with Kazeon Identifying, searching and managing electronic information is expensive and risks legal exposure. Learn to..
Legal Aspects of Incident Investigation Explore the world of legality and how to avoid serious errors that impairs an organization's ability..
Best Practices for Host-Based Intrusion (HIPS) Find out about the demand for host intrusion prevention systems, what evaluation criteria to..
The Federal Case for Application Delivery Networks Learn why visibility, acceleration, and security are essential to contain costs and..
Complying with Financial Services Regulations Through Information Availability Learn how protecting the increasingly complex and vital IT..
Local Governments Strengthen Service, Achieve New Operating Efficiencies with CRM Learn how independent analysis shows that Microsoft..
Navigating the Voluntary Disclosure Process Learn why a proactive approach can minimize inevitable costs...
Four Data Threats in a Post-PC World Managing BYOD, mobile devices, cloud storage and social networks...
Consolidation with HP Multifunction Printers Saves Money, Time for State The policy of keeping old printers was supposed to save money...
The Future of Drones: Sky-High Hopes vs. Regulatory Realities The tech giants are thought to be using their fleets of high-altitude,..
Do More with Less. Microsoft Dynamics® CRM for Federal Agencies Learn how Microsoft Dynamics CRM helps improve collaboration,..
Closing the Back Door on Network Application Vulnerabilities Web server protection and security strategy for individuals within the..
 
Copyright © 2015 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices
@@tpub@@