What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

TippingPoint Hacktivist Survival Guide: Whitepaper

The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Health IT: Some Pain, Some Gain: Asset

Health information technology is the right prescription for a health care system that is struggling to manage huge troves of health-related data and provide better and more affordable services to patients. Although the path to implementing electronic health records and achieving meaningful use has not been without some rough patches, speakers at a September 17th health IT conference in Washington, D.C., agreed that short-term pain is worth the long term-gain. Download this executive summary of the event to learn more.


Flash Storage: A Necessary Disruption: Whitepaper

It’s been a long time coming, but there is finally a revolution in storage that is breaking through performance barriers and allowing agencies to realize greater benefit from their growing data stores. The revolution is the all-flash storage array—solid state systems that use multiple flash memory drives instead of spinning hard disk drives. Read this informative whitepaper to learn why organizations are moving toward flash storage and the benefits this technology offers.


Application Deluge and Visibility Imperative: Whitepaper

Ensure network performance for your business-critical applications in private data centers, public clouds, and employee-owned mobile devices with complete application-level visibility across the entire environment.