| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка | 
| Protect: Protect Today, Secure Your Future. | 2009 | 256 | 10 | Способы и средства защиты от сетевых атак | 
| Key technologies in a network perimeter intrusion defense strategy | 2009 | 599 | 8 |  | 
| Network Attack and Defense | 2010 | 750 | 24 |  | 
| Uniting IAM and data protection for greater security | 2011 | 269 | 10 |  | 
| How to Prevent Rogue Antivirus Programs in the Enterprise (ESET) | 2010 | 1032 | 4 |  | 
| Ten Ways to Dodge CyberBullets David Harley | 2010David Harley, | 1182 | 15 |  | 
| How to Secure a PDF File | 2010 | 1049 | 5 |  | 
| Executive's Guide to Evaluating, Securing, and Deciding on Microsoft Internet Explorer 8 | 2010 | 289 | 5 |  | 
| Honeynets: a tool for counterintelligence in online security David Watson, | 2007 | 350 | 5 |  | 
| INTELLIGENT SELF-DEFENDING SECURE STORAGE | 2009 | 935 | 2 |  | 
| The Perils of Using the Wrong Approach to USB Flash Drive Security | January 9, 2008 | 129 | 6 |  | 
| Integrated Software Enhances Enterprise Security (Intel) | 2008 | 183 | 4 |  | 
| Detect and Survive By Robert Schifreen, UK-based IT Security Consultant and Author of Defeating the Hacker | 2010 | 312 | 8 |  | 
| Protecting Data From the Cyber Theft Pandemic | April, 2009 | 670 | 6 |  | 
| Maintaining trust: protecting your Web site users from malware. | November 2009IBM | 258 | 12 |  | 
| Top five strategies for combating modern threats Is anti-virus dead? | 2009 | 71 | 7 |  | 
| Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime | 2009 | 793 | 13 |  | 
| Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones | 2014 | 1285 | 24 | technical how-to guide—updated for Android 4.4,iOS 7.1, and WindowsPhone and Surface 8.1. | 
|  |  |  |  |  |