Ссылка | Дата | Объем в кб. | Число стр. | Справка |
The 2011 Application & Service Delivery Handbook | 2012 | 7294 | 147 | Jim Metzer, Ashton Metzer |
State Of Information Global Results | 2012 | 9476 | 13 | Ежегодние обзоры по ИТ-тематике |
Internet Enemies Report 2012 | 2012 | 2646 | 71 | Анализ политики по отношению к Интернет в разных странах |
On the Inside a security researcher Reveals her Work on a Windows security Review Team | January 2012 | 7183 | 59 | |
IBM X-Force 2011 Mid-year Trend and Risk Report | September 2011 | 15298 | 92 | |
2012: A review of the year In this guide you will find a full technology rundown of what happened in 2012 | 2013 | 1073 | 4 | |
The Compettitiveness and Innovative Capacity of the United States | 2013 | 5097 | 160 | Prepared by the U.S.Department of Commerce |
Gartner: Top 10 strategic technology trends for 2013 | 2013 | 1797 | 4 | By Michael Cooney |
Symantec Intelligence Report: November 2012 | 2013 | 848 | 14 | by Ben Nahorney (Symantec) |
2013 IT Priorities- Europe What’s driving IT managers’ technology decisions | January 2013 | 512 | 25 | |
2013 Threat Report | 2013 | 3995 | 10 | WebSense |
2013 computer crime blotter | December 16, 2013 | 2594 | 8 | By Bob Brown and IDG News Service, Network World |
World Intellectual Property Report 2013 | 2014 | 1731 | 140 | Brands – Reputation and Image in the Global Marketplace |
2014 Mid Year Security Threats Review Indusface Security Threat Report | 07 August 2014 | 482 | 19 | |
Annual Security Report. 2015. | 2015 | 5578 | 53 | Cisco |
2015 IT Priorities Editorial Global | 2015 | 12368 | 127 | Mark Schlack, Sr. VP/Editorial, TechTarget |
Global Risks 2015 10th Edition | 2015 | 3212 | 69 | World Economic Forum. (****) |
2015 Cyberthreat YearBook | 2015 | 4301 | 32 | Lior Kohavi (Cyren |
Trustwave Global Security Report. 2015 | 2015 | 3026 | 110 | Trustwave |
Threat Brief 2015 | 2015 | 3214 | 24 | WEBROOT |
2015 Cyberthreat Defense Report | 2015 | 1748 | 2 | A CyberEdge Group Report |
2015 State-of-the-WAN Report The Software Defined WAN Emerges | June 2015 | 569 | 21 | Citrix |
The most innovative and damaging hacks of 2015 | Dec 28, 2015 | 356 | 9 | Fahmida Y. Rashid |
32 Cybersecurity Facts to Learn From (!) | December 29, 2015 | 61 | 4 | Induface |
Cybersecurity in 2016: Real change or more of the same? | 2016 | 119 | 2 | GCN Awards |
Tech trends 2016: Cybersecurity in the connected world | 5 January 2016 | 284 | 5 | Matthew Wall |
McAfee Labs Threats Report | November 2015 | 6438 | 60 | McAfee Labs (***) |
2016 Security Pressures Report Based on a Survey Commissioned by Trustwave | 2016 | 1724 | 26 | Trustwave |
The Global Risks Report 2016. 11th Edition World Economic Forum | 2016103 | 11285 | 103 | Davos !!! |
World Quality Report 2015016 | 2016 | 4554 | 80 | 7 edition |
The Technology Industry 2016 by Mortimer Spinks and ComputerWeekly | 2016 | 837 | 50 | ComputerWeekly |
2030: The year mobile payments kill cash, according to security report | March 16, 2016 | 376 | 2 | Conner Forrest |
2016 Cyberthreat defence report. Noth America, Europe, Asia Pacific, Latin America | 2016 | 2564 | 36 | Cyberedge Group |
The Global Risks Report 2017. 12th Edition | 2017 | 8148 | 78 | World Economic Forum. Davos |
The Global Risks Report 2018 13th Edition | 2018 | 18632 | 80 | World Economic Forum |
Internet Crime Report. 2020 US FBI | 2021 | 2716 | 30 | US FBI |
DBIR. 2921 Data Breach Investigations Report | 2021 | 8672 | 119 | Verizon |