VISIT LIBRARY SPONSOR A BOOK HOW IT WORKS NEWSLETTER FEEDBACK

Dan Sullivan

Dan Sullivan has more than 20 years of IT experience that includes engagements in application design, systems architecture, and enterprise security. His experience includes a broad range of industries, including financial services, manufacturing, government, retail, gas and oil production, power generation, life sciences, and education. Dan has written and presented extensively about systems architecture, infrastructure management, and aligning business and IT strategies.  His articles have appeared in Intelligent Enterprise, Business Security Advisor, DM Review, and E-Business Advisor. He has written several books including The Shortcut Guide to Prioritizing Security Spending,The Definitive Guide to Security Management; The Definitive Guide to Information Theft Prevention; The Definitive Guide to Service Oriented Systems Management; The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam; The Tips and Tricks Guide to Secure Content Appliances; and The Shortcut Guide to Protecting Business Internet Usage.



Books by this author:

The Shortcut Guide to Extended Validation SSL Certificates
The Shortcut Guide to Protecting Business Internet Usage
The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam
The Definitive Guide to Enterprise Change Management
The Definitive Guide to Information Theft Prevention
The Definitive Guide to Service-Oriented Systems Management
The Essentials Series: Email-Centric Data Loss Prevention
The Essentials Series: Mid-Market Storage Management and Virtualization
The Essentials Series: Messaging and Web Security
The Essentials Series: SOA and Mainframe Applications
The Essentials Series: Messaging and Web Security - Volume 2
The Essentials Series: Messaging and Web Security - Volume 3
The Tips and Tricks Guide to Secure Content Applicances
The Essentials Series: Understanding and Responding to Network Threats
The Essentials Series: Selecting the Right Network Threat Management Solution
The Essentials Series: Security Information Management
The Essentials Series: The Evolving Landscape of Enterprise Data Protection
The Shortcut Guide to Prioritizing Security Spending
The Shortcut Guide to Business Security Measures Using SSL
The Essentials Series: Role of Database Activity Monitoring in Database Security
The Shortcut Guide to Using e-Documents for Collaboration
The Shortcut Guide to Availability, Continuity, and Disaster Recovery
The Definitive Guide to Cloud Computing
Eliminating Insecure and Unreliable File Transfer Methods
The Shortcut Guide to Assuring Website Performance through External Web Monitoring
Monitoring, Detecting, and Preventing Insider Fraud and Abuse
How to Install SSL Certificates on Microsoft Servers
The Essentials Series: Deploying and Managing Private Clouds
The Essentials Series: Preventing Data Loss Through Unsecure Browsers
The Essentials Series: Migrating to IPv6
The Essentials Series: Advanced Persistent Threats and Real-Time Threat Management
The Essentials Series: Streamlining Configuration Management
PCI Compliance and How SSL Certificates Fit
The SMB Security Series: How to Protect Your Business from Malware, Phishing, and Cybercrime
Protecting Against Web Application Threats using SSL
Controlling Costs with Managed File Transfer
The Essentials Series: Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Collaborative and Agile Project Management
Protecting Data with a Unified Platform
The Essentials Series: Securing SharePoint Content
The Definitive Guide to Cloud Acceleration
The Essentials Series: Achieving Continuous Data Protection
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Evolving Threat Landscape and the New Best Practices for SSL
Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems
Best Practices for Workload Automation in the Bimodal Era