Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"
-
Cyber Help (And Hope) For K-12 Targets
Sponsored by: SonicWallBecause K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.
-
A Computer Weekly buyer's guide to containerisation in the enterprise
Sponsored by: TechTarget ComputerWeekly.comContainerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.
-
Inside India: The world's IT powerhouse
Sponsored by: TechTarget ComputerWeekly.comThe Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?
-
CHAPTER 1: Preparing for the Exam
Sponsored by: McGraw HillThe Project Management Professional (PMP) and the Certified Associate in Project Management (CAPM) exams are a reliable way to help validate your project management skillset. With this exam prep guide, learn how to qualify for the PMP and the CAPM certification and create a strategy to pass the exam. Get started here.
-
Navigating The Paths Of Risk The State of Exposure Management in 2024
Sponsored by: XM CyberIn 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.
-
A Computer Weekly buyer's guide to zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
-
The State of Cybersecurity in Healthcare
Sponsored by: CyberMaxxTo deepen your understanding of the state of cybersecurity in the healthcare industry, and to learn about 3 major security risks, download this 8-page white paper.
-
2018/19 Salary Survey Results - UKI
Sponsored by: TechTarget ComputerWeekly.comIn the results of Computer Weekly's 2018 Salary Survey, we get a snapshot of what IT professionals in the UK and Ireland are getting paid, as well as their attitudes towards work, training and future prospects.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Business transformation through application modernization in the cloud
Sponsored by: AWSThe eBook “Unleash the Power of Generative AI: Build Better Applications, Faster” describes how companies and their application developers can overcome the barriers to generative AI adoption by leveraging AWS tools and services.