Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

eBook | Presented by Box

How to secure your bank's content in the cloud

Security breaches are happening frequently — and hitting banks hard. In fact, companies lose a third of their customers after a breach.

eBook | Presented by Box

Box and ECM: Key integrations that drive digital transformation

Legacy ECM solutions simply can't keep up with the way you work today. Work is more mobile, more collaborative, more agile. Business processes must be intelligent. And customer expectations never stop growing.

eBook | Presented by Netscout Systems Inc

UC&C Troubleshooting Guide

Unified Communications and Collaboration (UC&C) is complex, and even the best implementations run into issues. Be ready to solve your end users’ problems quickly and efficiently

eBook | Presented by Apptio

7 Killers of CIO Credibility

How do leading CIOs get acknowledged as a trusted adviser to the business? They avoid the top 7 credibility killers.

How to Succeed With Cloud-Managed Networks

With digital transformation comes a need for connectivity, but expanding networks can be complicated and costly — until now. Read this eBook to learn how to secure and scale connectivity with Aruba cloud-managed networking solutions.

eBook | Presented by Apptio

Showback & Chargeback: Optimize Technology Costs by Shaping Demand

This eBook outlines how organizations can leverage showback and chargeback to impact IT costs—to improve awareness and accountability, and to shape demand and consumption.

eBook | Presented by Panda Security

2019: A Record-Breaking Year For Ransomware

So what did ransomware in 2019 actually look like? Read on to learn about the biggest attacks of the year, how companies bounced back from them, and how you can stay protected in 2020.

eBook | Presented by BMC Software

Automate Cloud & DevOps Initiatives Across All Phases

DevOps and cloud computing get so much enterprise attention and investment today, it’s easy to forget the important fact that they are a means to an end.

eBook | Presented by Panda Security

Danger Hiding In Plain Sight: Controlling Weaponizable Applications

In this eBook, we will cover how to identify that a non-malicious application has been weaponized, the most common methods (like PowerShell), used to carry out attacks and methods to ensure your network stays protected against these kinds of threats.

eBook | Presented by ServiceNow Inc

Driving Radical Customer Service Innovation. Move beyond operational demands to deliver proactive strategies that drive business growth

How IT can help customer service move beyond operational demands to deliver business growth.

Load More