Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"
-
2024 Threat Hunter Perspectives: Insights From The Front Lines
Sponsored by: OpenTextInsights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.
-
AI tools for software developers: Part Two
Sponsored by: TechTarget ComputerWeekly.comThe Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
-
Email Security Buyer's Guide
Sponsored by: Checkpoint Software TechnologiesEmail is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.
-
A Computer Weekly buyer's guide to AI, ML and RPA
Sponsored by: TechTarget ComputerWeekly.comIn this 16-page buyer's guide, Computer Weekly looks at the evolution of productivity bots, the pros and cons of putting AI and ML applications in the cloud, and the growing number of injustices involving algorithms and automated decision-making
-
A Guide for Providers Healthcare Underpayments
Sponsored by: MD ClarityExplore the common sources of healthcare underpayments and learn how to detect, recover, and resolve them. Discover strategies to automate your revenue cycle and improve transparency with payers. Download this comprehensive guide to optimize your revenue and strengthen financial resilience.
-
Where Does Marketing Stop And Advertising Begin?
Sponsored by: SASAs data deprecation nears, brands must double down on first-party data strategies, use customer understanding and enterprise decisioning, and embrace data-driven omnichannel customer journey activation. Learn how to navigate the new world of tech in this white paper.
-
A Computer Weekly buyer's guide to blockchain technology
Sponsored by: TechTarget ComputerWeekly.comBlockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
-
Arctic Wolf Security Operations 2024 Report
Sponsored by: Arctic WolfThis report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
-
Focus: Campus local area networks (LAN)
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
-
Digital Disruption Index – from experimentation to transformation
Sponsored by: TechTarget ComputerWeekly.comOrganisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.