Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
CW Benelux ezine February 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.
-
MicroScope – September 2023: Channel pushes on against the odds
Sponsored by: MicroScopeIn this issue, we take a look at the struggles and triumphs faced by the channel this year so far. Also read up on possible solutions to the skills shortage, including the opening up of STEM to a more diverse range of students, and the necessity for improving skills on the job.
-
Containers: Making security and business sense
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
-
How to Democratize Analytics
Sponsored by: AlteryxData democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.
-
A guide to where mainframes fit in the cloud
Sponsored by: TechTarget ComputerWeekly.comFar from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
MicroScope – November 2020: Simplify the path to partner programmes
Sponsored by: MicroScopeIn this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
-
Zero Standing Privilege
Sponsored by: CyberFOXCybersecurity threats are on the rise, and businesses must take action to protect their data. This e-book explores the top cyber risks, the costs of breaches, and how to implement a Zero Trust security model with Privileged Access Management (PAM). Access the e-book to learn how to secure your organization and minimize risk.
-
2023 IT Priorities APAC Report
Sponsored by: TechTarget ComputerWeekly.comIT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.