ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    Sponsored by: TechTarget ComputerWeekly.com

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

  • Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • Transform your Applications

    Sponsored by: Red Hat

    Azure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.

  • Liberate Data and Modernize your Network for AI and LLM with Aviatrix

    Sponsored by: Aviatrix Systems

    Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.

  • Zscaler ThreatLabz 2024 Phishing Report

    Sponsored by: Zscaler

    The Zscaler ThreatLabz 2024 Phishing Report examines the evolving phishing landscape, including the impact of AI, top targeted industries, and emerging tactics like vishing and browser-in-the-browser attacks. Learn how to enhance your organization's phishing defenses by reading the full report.

  • Zscaler ThreatLabz 2024 Phishing Report

    Sponsored by: Zscaler

    Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.

  • Migrate to AWS Simply and Securely with Zscaler

    Sponsored by: Zscaler

    As organizations migrate applications to the cloud, securing access to internal apps can be challenging. This e-book explores how Zscaler Private Access (ZPA) can accelerate application migration to AWS while enhancing security and user experience. Keep reading to unlock 13 pages of insights.

  • SHEDDING LIGHT ON OEM STORAGE SUPPORT

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async

    Sponsored by: Fabric Health

    Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.

  • EU data protection: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.