ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"

  • The Evolution of Ecommerce

    Sponsored by: LexisNexis® Risk Solutions

    PH

  • Computer Weekly Buyer's Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.

  • How to Drive Value From a Managed Service Provider (MSP)

    Sponsored by: Advanced

    Download this e-book for an essential overview of key considerations to take into account when thinking about working with an MSP, so you can drive your business into the future and start reaping the benefits.

  • Maximize your data insights with AI

    Sponsored by: Dell Technologies

    In this e-book, explore how organizations are innovating to drive business outcomes, what's blocking them, and how they can take advantage of new technologies like generative AI as an innovation accelerator.

  • Path to Resilience Building a Modern Security Program

    Sponsored by: Splunk

    Today’s SOC teams face a constellation of challenges. In this e-book, Splunk provides insights into how you can utilize SOC to solve these challenges and develop a unified approach to digital resilience. Read the e-book now to learn more.

  • Zscaler ThreatLabz State of Encrypted Attacks Report

    Sponsored by: Zscaler

    Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • A Computer Weekly buyer's guide to retail technology

    Sponsored by: TechTarget ComputerWeekly.com

    The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.

  • Elevate your Security with Microsoft Defender for Business

    Sponsored by: Arrow MSFT

    Microsoft Defender for Business brings enterprise-grade security to SMBs with cross-platform protection, endpoint detection and response, and vulnerability management. Learn how this solution can help secure your organization's devices and data.

  • Cultivate a PMM Capability that Helps Optimize Your Entire GTM

    Sponsored by: TechTarget

    How can your organization transform “alignment” from a buzzword into a performance-driving strategy? Review this TechTarget e-book to unlock Forrester’s framework for planning and activating GTM alignment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.