ComputerWeekly.com: White Papers, Case Studies, and Products

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
All resources sponsored by:
ComputerWeekly.com
1 - 15 of 922 Matches
Sort by: Title | Posted Date | Publication Date | Document Type
A Terrorists Utilisation of the Internet
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:As the technological landscape continues to evolve, cyber-criminals and cyber-terrorists are utilsing the internet and web based tools to help carry out their attacks. In this essential guide, experts delve deeper into the current threat and its potential evolution. To learn more, simply participate in our brief Vulnerability Management Survey.
Get This Now

Baffled by managing digital identity?
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.
Get This Now

Network Management: In with the New, Out with the Old
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Networking departments are in the midst of a technological revolution. Download Computer Weekly's Buyer's Guide to Networks to discover how a network virtualisation movement intends to replace proprietary hardware controls with virtualised software equivalents. Simply take our brief Network Management Survey to get immediate access to the guide.
Get This Now

Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Get This Now

Are you using the right tablet device?
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.
Get This Now

Challenges with Cloud Security?
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Get This Now

Participate in our Customer Experience and Customer Relationship Management Research Program!
sponsored by ComputerWeekly.com
Resource: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.
Get This Now

Under-represented and Undervalued
sponsored by ComputerWeekly.com
Presentation: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:In this presentation from Computer Weekly's Women in IT event, Gillian Arnold talks about the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.
Get This Now

Computer Weekly – 29 July 2014: Going mobile in financial services
sponsored by ComputerWeekly.com
Ezine: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Get This Now

Application data security risks on Android devices
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 23 Jul 2014
Published:23 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Get This Now

Security issues in Vanets
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 23 Jul 2014
Published:23 Jul 2014
Summary:This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.
Get This Now

Memory corruption attacks
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Get This Now

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Get This Now

Tactics to combat insider threat
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Get This Now

Russia's answer to Silicon Valley
sponsored by ComputerWeekly.com
eGuide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:The Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.
Get This Now

1 - 15 of 922 Matches
Page: 2 3 4 5 6 7 8 9 10 11 


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com