Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Tethering Brand and Buyer Differentiating Your Brand in an Evolving B2B Environment
Sponsored by: TechTargetDiscover in this TechTarget white paper the latest hurdles facing digital marketers in the B2B space, and learn how your organization can overcome them.
-
The Evolution of Ecommerce
Sponsored by: LexisNexis® Risk SolutionsPH
-
How to enhance your network for the future
Sponsored by: TechTarget ComputerWeekly.comThe world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
-
Build Modern Applications on AWS eBook
Sponsored by: AWSTake a look through this e-book to learn about building modern applications on AWS, and to see the success that working on AWS has delivered for businesses like Coca Cola.
-
Customer service technologies emerge bloodied but unbowed from Covid-19 pandemic
Sponsored by: TechTarget ComputerWeekly.comThe pandemic caused many businesses to reassess their approach to customer experience. Customers were changing their behaviour, their channels, their brands and suppliers and organisations had to adapt. Download this exclusive e-guide and read more about the transformative impact of the pandemic on customer service and experience.
-
Identity security fundamentals
Sponsored by: SailPoint TechnologiesProviding fast, accurate access to digital resources for those who need it is essential for organizations to secure business and gain a competitive edge. This e-book will review the fundamentals of identity security and discuss how identity security best protects critical assets. Read on to learn more.
-
Master Data Management Strategy Template (eBook)
Sponsored by: SemarchyThis Master Data Management Strategy Template provides a comprehensive framework for organizations to successfully establish and maintain a robust MDM program to facilitate data-driven decisions for continuous improvement. Read on to get started.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.