Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
Australia's cybersecurity game plan
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
Data protection, a live issue that affects us all
Sponsored by: TechTarget ComputerWeekly.comDefined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
Cloud networking and CDN: How to get the best for your business
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).
-
Hyper-converged infrastructure vs traditional: the pitfalls and benefits of a storage move
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we give an overview to buying hyper-converged in which we dig into its benefits, such as ease of deployment, resource efficiency, low Opex costs and reduced use of datacentre space. But we also look at the potential pitfalls that include the difficulties of troubleshooting in a tightly-layered environment.
-
A guide to continuous software delivery
Sponsored by: TechTarget ComputerWeekly.comSoftware empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
-
Navigate the era of new customer expectations
Sponsored by: ServiceNowFor companies to be successful, they must achieve the delicate balance of finding ways to reduce costs while still delivering seamless customer experiences that stand out versus the competition. Today, focusing solely on customer engagement is not enough. Customers also want easy problem-solving with minimal effort. Read on to see how to offer it.
-
Quocirca: Selecting a cloud printing platform
Sponsored by: TechTarget ComputerWeekly.comAs IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
-
How the application integration landscape is changing
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.
-
Identity Fabrics: Analysis and overview
Sponsored by: One IdentityThis Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.